NetHack 3.6.x before 3.6.4 is prone to a buffer overflow vulnerability when reading very long lines from configuration files. This affects systems that have NetHack installed suid/sgid, and shared systems that allow users to upload their own configuration files.
References
Link | Resource |
---|---|
https://github.com/NetHack/NetHack/commit/f001de79542b8c38b1f8e6d7eaefbbd28ab94b47 | Patch |
https://bugs.debian.org/947005 | Issue Tracking Patch Third Party Advisory |
https://github.com/NetHack/NetHack/commit/f4a840a48f4bcf11757b3d859e9d53cc9d5ef226 | Patch |
https://nethack.org/security/ | Vendor Advisory |
https://github.com/NetHack/NetHack/security/advisories/GHSA-3cm7-rgh5-9pq5 | Third Party Advisory |
Configurations
Information
Published : 2019-12-19 10:15
Updated : 2019-12-27 10:00
NVD link : CVE-2019-19905
Mitre link : CVE-2019-19905
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
nethack
- nethack