Buffer Overflow Affecting nethack package, versions [,3.6.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.13% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-NETHACK-2380920
  • published26 Jan 2022
  • disclosed28 Jan 2020
  • creditUnknown

Introduced: 28 Jan 2020

CVE-2020-5209  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade nethack to version 3.6.5 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow. In NetHack before 3.6.5, unknown options starting with -de and -i can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5.

CVSS Base Scores

version 3.1