{"id":"CVE-2017-10684","details":"In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.","modified":"2026-03-14T09:23:45.253541Z","published":"2017-06-29T23:29:00.223Z","related":["MGASA-2018-0001","MGASA-2018-0002","SUSE-SU-2017:1790-1","SUSE-SU-2017:1815-1","SUSE-SU-2017:2075-1","SUSE-SU-2017:2076-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201804-13"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1464687"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mirror/ncurses","events":[{"introduced":"0"},{"last_affected":"ed3eb506e9a8e6ea871a2eb5818e19ba36f3f277"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.0"}]}}],"versions":["v4.1","v4.2","v5.0","v5.1","v5.2","v5.3","v5.4","v5.5","v5.6","v5.7","v5.8","v5.9","v6.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-10684.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}