Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-29491: n/a

0
Unknown
VulnerabilityCVE-2023-29491cvecve-2023-29491
Published: Fri Apr 14 2023 (04/14/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:33:38 UTC

Technical Analysis

CVE-2023-29491 is a vulnerability in the ncurses library prior to version 6.4 (released 2023-04-08) that affects setuid applications using ncurses for terminal handling. Ncurses relies on terminfo database files to determine terminal capabilities. This vulnerability occurs when a local user supplies malformed data in a terminfo database file located in their home directory ($HOME/.terminfo) or referenced through the TERMINFO or TERM environment variables. When a setuid application uses ncurses to process these files, the malformed data can trigger memory corruption, which is security-relevant and may lead to privilege escalation. Since setuid applications run with elevated privileges, exploiting this flaw could allow a local attacker to execute arbitrary code with higher privileges. The vulnerability requires local access and the ability to influence environment variables or place crafted terminfo files. No CVSS score has been assigned yet, and no exploits are publicly known. The flaw is significant because ncurses is widely used in Unix-like systems, and many setuid applications depend on it for terminal handling. The vulnerability highlights the risk of processing untrusted input in privileged contexts. The patch involves updating ncurses to version 6.4 or later, which corrects the memory corruption issue by properly validating terminfo data. Until patched, restricting user control over environment variables and terminfo files can reduce risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to Unix/Linux servers and workstations that run setuid applications linked against vulnerable ncurses versions. Successful exploitation could allow local attackers to escalate privileges, potentially gaining root or other elevated access. This could lead to unauthorized access to sensitive data, disruption of services, or further lateral movement within networks. Critical infrastructure, government, financial institutions, and enterprises relying on Linux-based systems for operations are particularly vulnerable. The impact is heightened in environments where multiple users have local access or where remote access is granted via SSH to user accounts. Since no remote exploitation vector is indicated, the threat is limited to local attackers but remains serious due to the privilege escalation potential. The absence of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Upgrade ncurses to version 6.4 (20230408) or later as soon as possible to apply the official fix. 2. Audit and restrict permissions on $HOME/.terminfo directories and files to prevent unauthorized modification. 3. Limit the ability of unprivileged users to influence TERMINFO and TERM environment variables in contexts where setuid applications run. 4. Review and harden setuid applications that use ncurses, ensuring they do not run with unnecessary privileges or in environments where user-controlled environment variables can be manipulated. 5. Employ mandatory access controls (e.g., SELinux, AppArmor) to restrict setuid application behavior and access to user environment variables and files. 6. Monitor logs for suspicious activity related to environment variable manipulation or terminfo file access. 7. Educate system administrators about the risks of environment variable injection in privileged contexts. 8. Consider isolating critical setuid applications in containers or sandboxes to limit the impact of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-04-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a439b6d939959c8fdd598

Added to database: 11/4/2025, 6:19:07 PM

Last enriched: 11/4/2025, 6:33:38 PM

Last updated: 11/6/2025, 1:43:04 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats