Learn about CVE-2020-5210 affecting NetHack before 3.6.5. Understand the buffer overflow vulnerability, its impact, affected systems, and mitigation steps.
NetHack command line -w option parsing is subject to a buffer overflow.
Understanding CVE-2020-5210
In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow leading to a crash or remote code execution/privilege escalation.
What is CVE-2020-5210?
NetHack before version 3.6.5 is vulnerable to a buffer overflow via an invalid argument to the -w command line option.
The vulnerability affects systems with NetHack installed suid/sgid and shared systems allowing user influence on command line options.
The Impact of CVE-2020-5210
CVSS Base Score: 5 (Medium)
Attack Vector: Local
Attack Complexity: High
Privileges Required: Low
User Interaction: Required
Scope: Changed
Confidentiality, Integrity, and Availability Impact: Low
Technical Details of CVE-2020-5210
Vulnerability Description
The vulnerability arises from improper handling of command line options in NetHack before version 3.6.5, leading to a buffer overflow.
Affected Systems and Versions
Affected Product: NetHack
Vendor: NetHack
Vulnerable Versions: < 3.6.5
Exploitation Mechanism
Attackers can exploit this vulnerability by providing a malicious argument to the -w command line option, triggering a buffer overflow.
Mitigation and Prevention
Immediate Steps to Take
Upgrade NetHack to version 3.6.5 to mitigate the vulnerability.
Long-Term Security Practices
Avoid running NetHack with elevated privileges unless necessary.
Regularly monitor and restrict user access to command line options.
Patching and Updates
Stay informed about security advisories and promptly apply patches provided by NetHack.
Popular CVEs
CVE Id
Published Date
Is your System Free of Underlying Vulnerabilities? Find Out Now