Severity
4.8MEDIUM
EPSS
0.1%
top 78.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 16
Latest updateJun 17

Description

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

Debianncurses< 6.5+20251115-2
CVEListV5gnu/ncurses6.5-20250322

🔴Vulnerability Details

3
GHSA
GHSA-wfwf-ggr2-rpjf: A vulnerability has been found in GNU ncurses up to 62025-06-17
CVEList
GNU ncurses parse_entry.c postprocess_termcap stack-based overflow2025-06-16
OSV
CVE-2025-6141: A vulnerability has been found in GNU ncurses up to 62025-06-16

📋Vendor Advisories

3
Red Hat
gnu-ncurses: ncurses Stack Buffer Overflow2025-06-16
Microsoft
GNU ncurses parse_entry.c postprocess_termcap stack-based overflow2025-06-10
Debian
CVE-2025-6141: ncurses - A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified ...2025
CVE-2025-6141 (MEDIUM CVSS 4.8) | A vulnerability has been found in G | cvebase.io