Buffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges via a long -s command line option.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/311172/2003-02-08/2003-02-14/0 | Exploit Third Party Advisory VDB Entry |
http://nethack.sourceforge.net/v340/bugmore/secpatch.txt | Patch Third Party Advisory |
http://www.debian.org/security/2003/dsa-316 | Third Party Advisory |
http://www.debian.org/security/2003/dsa-350 | Third Party Advisory |
http://www.securityfocus.com/bid/6806 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11283 | Third Party Advisory VDB Entry |
Information
Published : 2003-06-08 21:00
Updated : 2020-12-09 07:15
NVD link : CVE-2003-0358
Mitre link : CVE-2003-0358
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
falconseye_project
- falconseye
debian
- debian_linux
nethack
- nethack