
Cloud Vulnerability DB
A community-led vulnerabilities database
The ncurses crate through version 5.99.0 for Rust contains security vulnerabilities related to format string issues and buffer overflows. The vulnerability was identified as RUSTSEC-2025-0006 and affects the interaction between Rust code and C functions in the ncurses library wrapper (RustSec Advisory).
The vulnerability stems from two main issues: format string vulnerabilities in printw functions due to mishandled C format arguments, and buffer overflows in instr and mvwinstr functions due to improper interaction with C functions. These issues arise from the interface between Rust's memory-safe environment and the underlying C library calls (RustSec Advisory).
The vulnerabilities can potentially lead to arbitrary data writes to stack memory through format string attacks and buffer overflows, which could result in application crashes or potential code execution. The issues affect applications using the ncurses crate for terminal manipulation and text-based user interfaces (Register Article).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."