SB2022052624 - Ubuntu update for ncurses



SB2022052624 - Ubuntu update for ncurses

Published: May 26, 2022

Security Bulletin ID SB2022052624
Severity
High
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 18% Low 82%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2017-10684)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists in the fmt_entry function of ncurses due to stack-based buffer overflow when handling malicious input. A remote unauthenticated attacker can send a request that submits malicious input, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Use of externally-controlled format string (CVE-ID: CVE-2017-10685)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in the fmt_entry function due to use of externally-controlled format string. A remote attacker can submit a specially crafted input and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

3) Improper input validation (CVE-ID: CVE-2017-11112)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the append_acs function of tinfo/parse_entry.c due to an attempted 0xffffffffffffffff access. A remote attacker can cause the service to crash if the terminfo library code is used to process untrusted terminfo data.

4) NULL pointer dereference (CVE-ID: CVE-2017-11113)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the _nc_parse_entry function of tinfo/parse_entry.c due to NULL pointer dereference. A remote attacker can cause the service to crash if the terminfo library code is used to process untrusted terminfo data.

5) Infinite loop (CVE-ID: CVE-2017-13728)

The vulnerability allows a remote attacker to cause Dos condition on the target system.

The weakness exists in the next_char function in comp_scan.c due to an infinite loop. A remote attacker can submit a specially crafted input and cause the service to crash.

6) Improper input validation (CVE-ID: CVE-2017-13729)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the _nc_save_str function in alloc_entry.c due to an illegal address access. A remote attacker can cause the service to crash.

7) Improper input validation (CVE-ID: CVE-2017-13730)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the function _nc_read_entry_source() in progs/tic.c due to an illegal address access. A remote attacker can cause the service to crash.

8) Improper input validation (CVE-ID: CVE-2017-13731)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the function postprocess_termcap() in parse_entry.c due to an illegal address access. A remote attacker can cause the service to crash.

9) Improper input validation (CVE-ID: CVE-2017-13732)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the function dump_uses() in progs/dump_entry.c due to an illegal address access. A remote attacker can cause the service to crash.

10) Improper input validation (CVE-ID: CVE-2017-13733)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the fmt_entry function in progs/dump_entry.c  due to an illegal address access. A remote attacker can cause the service to crash.

11) Improper input validation (CVE-ID: CVE-2017-13734)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the _nc_safe_strcat function in strings.c due to an illegal address access. A remote attacker can cause the service to crash.

Remediation

Install update from vendor's website.