CVE-2002-0062

Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
References
Link Resource
http://www.debian.org/security/2002/dsa-113 Patch Vendor Advisory
http://www.iss.net/security_center/static/8222.php Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2002-020.html Patch Vendor Advisory
http://www.securityfocus.com/bid/2116 Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.debian.org/security/2002/dsa-113 Patch Vendor Advisory
http://www.iss.net/security_center/static/8222.php Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2002-020.html Patch Vendor Advisory
http://www.securityfocus.com/bid/2116 Patch Third Party Advisory VDB Entry Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.1:*:alpha:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.1:*:i386:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.2:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:38

Type Values Removed Values Added
References () http://www.debian.org/security/2002/dsa-113 - Patch, Vendor Advisory () http://www.debian.org/security/2002/dsa-113 - Patch, Vendor Advisory
References () http://www.iss.net/security_center/static/8222.php - Third Party Advisory () http://www.iss.net/security_center/static/8222.php - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2002-020.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2002-020.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/2116 - Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/2116 - Patch, Third Party Advisory, VDB Entry, Vendor Advisory

Information

Published : 2002-03-08 05:00

Updated : 2024-11-20 23:38


NVD link : CVE-2002-0062

Mitre link : CVE-2002-0062

CVE.ORG link : CVE-2002-0062


JSON object : View

Products Affected

freebsd

  • freebsd

gnu

  • ncurses

suse

  • suse_linux

redhat

  • linux

debian

  • debian_linux
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')