CVE-2000-0963

Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.
References
Link Resource
http://www.calderasystems.com/support/security/advisories/CSSA-2000-036.0.txt Patch Vendor Advisory
http://www.securityfocus.com/archive/1/138550 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/1142 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/44487 VDB Entry Vendor Advisory
http://www.calderasystems.com/support/security/advisories/CSSA-2000-036.0.txt Patch Vendor Advisory
http://www.securityfocus.com/archive/1/138550 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/1142 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/44487 VDB Entry Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*
cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:33

Type Values Removed Values Added
References () http://www.calderasystems.com/support/security/advisories/CSSA-2000-036.0.txt - Patch, Vendor Advisory () http://www.calderasystems.com/support/security/advisories/CSSA-2000-036.0.txt - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/138550 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/138550 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/1142 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/1142 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44487 - VDB Entry, Vendor Advisory () https://exchange.xforce.ibmcloud.com/vulnerabilities/44487 - VDB Entry, Vendor Advisory

03 Mar 2023, 20:03

Type Values Removed Values Added
CPE cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*
References (BUGTRAQ) http://www.securityfocus.com/archive/1/138550 - (BUGTRAQ) http://www.securityfocus.com/archive/1/138550 - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/1142 - Exploit, Patch, Vendor Advisory (BID) http://www.securityfocus.com/bid/1142 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/44487 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/44487 - VDB Entry, Vendor Advisory

Information

Published : 2000-12-19 05:00

Updated : 2024-11-20 23:33


NVD link : CVE-2000-0963

Mitre link : CVE-2000-0963

CVE.ORG link : CVE-2000-0963


JSON object : View

Products Affected

redhat

  • linux

immunix

  • immunix

freebsd

  • freebsd

gnu

  • ncurses