Executive Summary
Summary | |
---|---|
Title | New jnethack packages fix buffer overflow, incorrect permissions |
Informations | |||
---|---|---|---|
Name | DSA-316 | First vendor Publication | 2003-06-11 |
Vendor | Debian | Last vendor Modification | 2003-06-17 |
Severity (Vendor) | N/A | Revision | 3 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.6 | Attack Range | Local |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The jnethack package is vulnerable to a buffer overflow exploited via a long '-s' command line option. This vulnerability could be used by an attacker to gain gid 'games' on a system where jnethack is installed. Additionally, some setgid binaries in the jnethack package have incorrect permissions, which could allow a user who gains gid 'games' to replace these binaries, potentially causing other users to execute malicious code when they run jnethack. For the stable distribution (woody) these problems have been fixed in version 1.1.5-11woody2. For the old stable distribution (potato) these problems have been fixed in version 1.1.3-4potato1. For the unstable distribution (sid) these problems are fixed in version 1.1.5-15. We recommend that you update your jnethack package. |
Original Source
Url : http://www.debian.org/security/2003/dsa-316 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Os | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 316-1 (nethack) File : nvt/deb_316_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 350-1 (falconseye) File : nvt/deb_350_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
12021 | nethack SGID Binary Installation Permission Weakness |
12020 | Falcon's Eye falconseye -s Option Local Overflow |
12019 | nethack -s Option Local Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-316.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-350.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:40 |
|