Skip to main content
Version: latest

CVE-2021-39537

CVE Details

Visit the official vulnerability details page for CVE-2021-39537 to learn more.

Initial Publication

10/25/2024

Last Update

12/16/2024

Third Party Dependency

ncurses-base

NIST CVE Summary

An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.

CVE Severity

8.8

Our Official Summary

This vulnerability is reported on some 3rd party images used by our products. This flaw results from a lack of proper bounds checking during input processing. By exploiting this boundary error, an attacker can create a malicious file, deceive the victim into opening it using the affected software, and initiate an out-of-bounds write, potentially impacting system availability.

Explotation risk for our products is low because, attacker needs privileged access to trigger this. Impact of exploitation is not high as this component doesn't significantly affect overall system availability. We are waiting on an upstream fixes from the 3rd party vendor. We will upgrade the images once the upstream fix becomes available.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.5.15⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.11⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.10⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.8⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.5⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.4⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.4.20⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted

Revision History

DateRevision
12/16/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11, 4.5.15
11/21/2024Official summary revised: This vulnerability is reported on some 3rd party images used by our products. This flaw results from a lack of properbounds checking during input processing. By exploiting this boundary error, an attacker can create a malicious file,deceive the victim into opening it using the affected software, and initiate an out-of-bounds write, potentiallyimpacting system availability. Explotation risk for our products is low because, attacker needs privileged access to trigger this. Impact of exploitation is not high as this component doesn't significantly affect overall system availability. We are waiting on an upstream fixes from the 3rd party vendor. We will upgrade the images once the upstream fix becomes available.
11/15/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11
11/15/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10
11/13/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8 to 4.5.4, 4.5.5, 4.5.8, 4.4.20
11/10/2024Impacted versions changed from 4.5.4, 4.5.5 to 4.5.4, 4.5.5, 4.5.8
10/27/2024Impacted versions changed from 4.5.4 to 4.5.4, 4.5.5