Page 2 of 9 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

In NetHack before 3.6.5, unknown options starting with -de and -i can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5. En NetHack versiones anteriores a 3.6.5, las opciones desconocidas que comienzan con -de y -i pueden causar un desbordamiento del búfer resultando en un bloqueo o en una ejecución de código remota/escalada de privilegios. Esta vulnerabilidad afecta a los sistemas que tienen instalado suid/sgid de NetHack y sistemas compartidos que permiten a usuarios influir en las opciones de línea de comandos. • https://github.com/NetHack/NetHack/commit/f3def5c0b999478da2d0a8f0b6a7c370a2065f77 https://github.com/NetHack/NetHack/security/advisories/GHSA-fw72-r8xm-45p8 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5. En NetHack versiones anteriores a 3.6.5, un argumento no válido para la opción de línea de comando -w puede causar un desbordamiento del búfer resultando en un bloqueo o en una ejecución de código remota/escalada de privilegios. Esta vulnerabilidad afecta a los sistemas que tienen instalado suid/sgid de NetHack y sistemas compartidos que permiten a usuarios influir en las opciones de línea de comandos. • https://github.com/NetHack/NetHack/commit/f3def5c0b999478da2d0a8f0b6a7c370a2065f77 https://github.com/NetHack/NetHack/security/advisories/GHSA-v5pg-hpjg-9rpp • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

nethack 3.4.0 and earlier installs certain setgid binaries with insecure permissions, which allows local users to gain privileges by replacing the original binaries with malicious code. nethack 3.4.0 y anteriores instala ciertos binarios con permisos inseguros, lo que permite a usuarios locales ganar privilegios. • http://www.debian.org/security/2003/dsa-316 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 5

Buffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges via a long -s command line option. Desbordamiento de búfer en nethack 3.4.0 y anteriores permite que usuarios locales obtengan privilegios mediante la opción -s en la línea de comandos. • https://www.exploit-db.com/exploits/22233 https://www.exploit-db.com/exploits/22234 https://www.exploit-db.com/exploits/22235 https://github.com/fengjixuchui/CVE-2003-0358 http://nethack.sourceforge.net/v340/bugmore/secpatch.txt http://www.debian.org/security/2003/dsa-316 http://www.debian.org/security/2003/dsa-350 http://www.securityfocus.com/archive/1/311172/2003-02-08/2003-02-14/0 http://www.securityfocus.com/bid/6806 https://exchange.xforce.ibmcloud.com/vuln • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •