Lucene search

K
gentooGentoo FoundationGLSA-201006-14
HistoryJun 02, 2010 - 12:00 a.m.

Newt: User-assisted execution of arbitrary code

2010-06-0200:00:00
Gentoo Foundation
security.gentoo.org
10

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

10.1%

Background

Newt is a library for displaying text mode user interfaces.

Description

Miroslav Lichvar reported that Newt is prone to a heap-based buffer overflow in textbox.c.

Impact

A remote attacker could entice a user to enter a specially crafted string into a text dialog box rendered by Newt, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application, or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Newt users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/newt-0.52.10-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since October 26, 2009. It is likely that your system is already no longer affected by this issue.

OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/newt< 0.52.10-r1UNKNOWN

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

10.1%