Metrics
Affected Vendors & Products
Tue, 17 Jun 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 17 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Jun 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component. | |
Title | GNU ncurses parse_entry.c postprocess_termcap stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-16T22:00:17.088Z
Updated: 2025-06-17T13:52:08.255Z
Reserved: 2025-06-15T11:06:16.592Z
Link: CVE-2025-6141

Updated: 2025-06-17T13:52:03.927Z

Status : Awaiting Analysis
Published: 2025-06-16T22:16:41.527
Modified: 2025-06-17T20:50:23.507
Link: CVE-2025-6141
