Description
The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.
Published: 2026-03-19
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Possible Code Execution via Stack Overflow
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow exists in the analyze_string function of the ncurses infocmp command‑line utility. The flaw allows an attacker to exceed the bounds of a local array and overwrite adjacent stack memory, potentially corrupting control flow and achieving arbitrary code execution. The vulnerability can be exercised by supplying specially crafted arguments to the infocmp program, so the impact is tied to the ability to run the tool with untrusted input.

Affected Systems

All GNU ncurses distributions prior to the 6.5‑20251213 release are affected. This includes every 6.5 minor revision issued before December 13, 2025, as well as earlier major releases. The vulnerable code resides in the core ncurses source tree, meaning any operating system or platform that ships ncurses without the patch is susceptible.

Risk and Exploitability

The CVSS score of 7.3 reflects a high severity of this flaw, yet the EPSS score is below 1 % and the vulnerability is not listed in CISA’s KEV catalog, suggesting that exploitation in the wild is currently unlikely. Based on the description, it is inferred that the attack vector is local or requires an environment where the infocmp binary is executed with input that can be controlled by an attacker. No public exploits have been reported, but the underlying buffer overflow could be leveraged in a targeted or chain‑based attack if an attacker can trigger the vulnerable path.

Generated by OpenCVE AI on March 26, 2026 at 21:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ncurses to version 6.5‑20251213 or later, which removes the vulnerable code.
  • If an immediate upgrade is infeasible, restrict execution of the infocmp binary to privileged users or disable the executable altogether.
  • Verify that the installed ncurses package matches the patched version by checking the package manager’s metadata or a trusted checksum.
  • Monitor system logs for unusual invocations of infocmp and review access controls if suspicious activity is detected.
  • Stay informed about future ncurses releases or backport advisories from the maintainers.

Generated by OpenCVE AI on March 26, 2026 at 21:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Invisible-island
Invisible-island ncurses
CPEs cpe:2.3:a:invisible-island:ncurses:*:*:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240427:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240504:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240511:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240518:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240519:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240525:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240601:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240608:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240615:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240622:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240629:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240706:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240713:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240720:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240727:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240810:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240817:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240824:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240831:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240914:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240922:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20240928:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241006:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241019:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241026:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241102:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241109:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241123:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241130:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241207:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241214:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241221:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20241228:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250104:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250111:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250118:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250125:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250201:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250208:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250215:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250216:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250222:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250301:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250308:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250315:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250322:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250329:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250405:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250412:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250419:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250426:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250503:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250510:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250517:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250524:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250531:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250614:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250621:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250628:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250705:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250712:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250720:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250726:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250802:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250809:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250816:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250823:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250830:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250913:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250920:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20250927:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251004:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251010:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251018:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251025:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251101:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251115:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251122:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251123:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251129:*:*:*:*:*:*
cpe:2.3:a:invisible-island:ncurses:6.5:20251206:*:*:*:*:*:*
Vendors & Products Invisible-island
Invisible-island ncurses

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description ncurses v6.5 and v6.4 are vulnerable to Buffer Overflow in progs/infocmp.c, function analyze_string(). The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.
Weaknesses CWE-121
CPEs cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L'}


Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Title ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.
Weaknesses CWE-120
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H'}

threat_severity

Moderate


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu ncurses
Vendors & Products Gnu
Gnu ncurses

Thu, 19 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Description ncurses v6.5 and v6.4 are vulnerable to Buffer Overflow in progs/infocmp.c, function analyze_string().
References

Subscriptions

Gnu Ncurses
Invisible-island Ncurses
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-26T15:08:06.834Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69720

cve-icon Vulnrichment

Updated: 2026-03-24T01:06:48.727Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T15:16:21.293

Modified: 2026-03-26T19:35:10.547

Link: CVE-2025-69720

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-19T00:00:00Z

Links: CVE-2025-69720 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T08:41:49Z

Weaknesses