Bug 1214489 (CVE-2020-19185) - VUL-0: CVE-2020-19185: ncurses: Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Summary: VUL-0: CVE-2020-19185: ncurses: Buffer Overflow vulnerability in one_one_mapp...
Status: RESOLVED FIXED
Alias: CVE-2020-19185
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/375945/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-19185:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-23 06:53 UTC by Stoyan Manolov
Modified: 2023-09-18 08:22 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stoyan Manolov 2023-08-23 06:53:06 UTC
CVE-2020-19185

Buffer Overflow vulnerability in one_one_mapping function in
progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial
of service via crafted command.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-19185
https://www.cve.org/CVERecord?id=CVE-2020-19185
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md
Comment 2 Dr. Werner Fink 2023-09-12 09:30:54 UTC
I see on SLE-12

noether:/ # infotocap -o /dev/null /tmp/infotocap_poc1.md 
"/tmp/infotocap_poc1.md", line 1, col 1: Illegal character (expected alphanumeric or @%&*!#) - '{'
Comment 3 Dr. Werner Fink 2023-09-12 10:29:49 UTC
For SLE-15

noether:/ # rpm -Uhv home/abuild/rpmbuild/RPMS/x86_64/ncurses-devel-6.1-0.x86_64.rpm 
Preparing...                          ################################# [100%]
Updating / installing...
   1:ncurses-devel-6.1-0              ################################# [100%]
noether:/ # infotocap -o /dev/null /tmp/infotocap_poc1.md 
"/tmp/infotocap_poc1.md", line 1, col 1: Illegal character (expected alphanumeric or @%&*!#) - '{'
Comment 4 Dr. Werner Fink 2023-09-13 08:02:06 UTC
btw: the part

``allows remote attackers to cause a denial of service via crafted command''

seems to be very overdrawn ... the command infotocap(1)

  infotocap(1) - convert a terminfo description into a termcap description

is only called by a user which wants a termcap entry for an existing terminfo
description (see terminfo(5)) ... as most programs today uses ncurses, means terminfo descriptions the command tic(1) is common

  tic(1) - the terminfo entry-description compiler

nevertheless unkown and unchecked terminfo descriptions shouldn't be used at all.

Beside this the allready backported patches makes tic(1) to use also the checker code for terminfo descriptions :

noether:/ # tic -o /tmp/foobar /tmp/infotocap_poc6.md 
"/tmp/infotocap_poc6.md", line 1, col 1: Illegal character (expected alphanumeric or @%&*!#) - '{'
noether:/ # rm -rf /tmp/foobar