[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[linux-security] ncurses vulnerabilities



Overview
========
Setuid programs that use ncurses may be used to gain local root access. 

Problem Description
===================
There used to be an overflowable buffer in the part of the ncurses library
handling cursor movement.
Attackers can force a privileged application to use their own termcap file
containing a special terminal entry which will trigger the ncurses
vulnerability, allowing them to execute arbitrary code with the privileges
of the exploited binary.

Affected Systems
================
(probably) all Linux distributions

Solution
========
RedHat 6.x
rpm -Fvh ncurses-5.0-12.i386.rpm ncurses-devel-5.0-12.i386.rpm

RedHat 7.0
rpm -Fvh ncurses-5.2-2.i386.rpm ncurses-devel-5.2-2.i386.rpm

Debian 2.2 (potato)
upgrade to the following packages: libncurses5-dbg_5.0-6.0potato1_i386.deb
                                   libncurses5-dev_5.0-6.0potato1_i386.deb
                                   libncurses5_5.0-6.0potato1_i386.deb
                                   ncurses-bin_5.0-6.0potato1_i386.deb

Debian Unstable (woody)
upgrade to ncurses 5.0-8 (sorry, I don't know the exact package names)

Caldera
rpm -Fvh ncurses-4.2-6.i386.rpm \
         ncurses-devel-4.2-6.i386.rpm \
         ncurses-devel-static-4.2-6.i386.rpm \
         ncurses-termcap-devel-4.2-6.i386.rpm \
         ncurses-termcap-devel-static-4.2-6.i386.rpm