• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft uncovers flaws in ncurses library affecting linux and macos

Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems

You are here: Home / General Cyber Security News / Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems
September 14, 2023

A established of memory corruption flaws have been uncovered in the ncurses (shorter for new curses) programming library that could be exploited by threat actors to run destructive code on vulnerable Linux and macOS programs.

“Using environment variable poisoning, attackers could chain these vulnerabilities to elevate privileges and run code in the targeted program’s context or conduct other destructive actions,” Microsoft Threat Intelligence scientists Jonathan Bar Or, Emanuele Cozzi, and Michael Pearse reported in a technical report posted today.

Cybersecurity

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The vulnerabilities, collectively tracked as CVE-2023-29491 (CVSS score of 7.8), have been dealt with as of April 2023. Microsoft claimed it also worked with Apple on addressing the macOS-distinct issues similar to these flaws.

Natural environment variables are user-defined values that can be made use of by many plans on a process and can have an affect on the manner in which they behave on the technique. Manipulating the variables can result in apps to execute in any other case unauthorized functions.

Microsoft’s code auditing and fuzzing found that the ncurses library queries for quite a few surroundings variables, together with TERMINFO, which could be poisoned and blended with the determined flaws to attain privilege escalation. Terminfo is a databases that enables plans to use exhibit terminals in a machine-unbiased method.

Upcoming WEBINARIdentity is the New Endpoint: Mastering SaaS Security in the Modern day Age

Dive deep into the upcoming of SaaS security with Maor Bin, CEO of Adaptive Shield. Explore why identification is the new endpoint. Protected your spot now.

Supercharge Your Expertise

The flaws encompass a stack data leak, a parameterized string variety confusion, an off-by-one mistake, a heap out-of-bounds all through terminfo database file parsing, and a denial-of-provider with canceled strings.

“The learned vulnerabilities could have been exploited by attackers to elevate privileges and run code within a focused program’s context,” the scientists reported. “Nevertheless, attaining command of a software as a result of exploiting memory corruption vulnerabilities requires a multi-stage attack.”

“The vulnerabilities may well have required to be chained with each other for an attacker to elevate privileges, these types of as exploiting the stack facts leak to acquire arbitrary study primitives alongside with exploiting the heap overflow to attain a produce primitive.”

Observed this report interesting? Adhere to us on Twitter  and LinkedIn to read through a lot more exclusive information we put up.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «free download manager site compromised to distribute linux malware to Free Download Manager Site Compromised to Distribute Linux Malware to Users for 3+ Years
Next Post: Iranian Nation-State Actors Employ Password Spray Attacks Targeting Multiple Sectors iranian nation state actors employ password spray attacks targeting multiple sectors»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.