The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of ncmpc: NULL pointer dereference

Synthesis of the vulnerability 

An attacker can force a NULL pointer to be dereferenced of ncmpc, in order to trigger a denial of service.
Vulnerable systems: Debian, Ubuntu.
Severity of this threat: 1/4.
Creation date: 27/04/2020.
Références of this weakness: CVE-2018-9240, DLA-2186-1, USN-4507-1, VIGILANCE-VUL-32096.

Description of the vulnerability 

An attacker can force a NULL pointer to be dereferenced of ncmpc, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity vulnerability impacts software or systems such as Debian, Ubuntu.

Our Vigil@nce team determined that the severity of this vulnerability is low.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this weakness alert.

Solutions for this threat 

Debian 8: new ncmpc packages.
New packages are available:
  Debian 8: ncmpc 0.24-1+deb8u1

Ubuntu 16.04: new ncmpc packages.
New packages are available:
  Ubuntu 16.04 LTS: ncmpc 0.24-1+deb8u1build0.16.04.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides networks vulnerabilities analysis. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.