Skip to content

NetHack Call command buffer overflow

High
nhkeni published GHSA-2cqv-5w4v-mgch Feb 17, 2023

Package

NetHack

Affected versions

>= 3.6.2

Patched versions

3.6.7

Description

Impact

Illegal input to the "C" (call) command can crash the NetHack process.

CVSS including Temporal Score

For a multiuser installation: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:R (6.5 Medium)
For a single user installation: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L (3.3 Low)

Patches

This issue is resolved in NetHack 3.6.7.

Workarounds

None.

Additional information, if any, will be made available at https://nethack.org/security.

For more information

If you have any questions or comments about this advisory:

Severity

High
7.8
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2023-24809

Weaknesses

Credits