CVE-2019-19905
moderate-risk
Published 2019-12-19
NetHack 3.6.x before 3.6.4 is prone to a buffer overflow vulnerability when reading very long lines from configuration files. This affects systems that have NetHack installed suid/sgid, and shared systems that allow users to upload their own configuration files.
Do I need to act?
~
3.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: cf9e92677a18d1bc66c040068b2e666c651c7522, f001de79542b8c38b1f8e6d7eaefbbd28ab94b47, f4a840a48f4bcf11757b3d859e9d53cc9d5ef226
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Nethack
Affected Vendors
References (10)
Issue Tracking
https://bugs.debian.org/947005
Third Party Advisory
https://github.com/NetHack/NetHack/security/advisories/GHSA-3cm7-rgh5-9pq5
Vendor Advisory
https://nethack.org/security/
Issue Tracking
https://bugs.debian.org/947005
Third Party Advisory
https://github.com/NetHack/NetHack/security/advisories/GHSA-3cm7-rgh5-9pq5
Vendor Advisory
https://nethack.org/security/
44
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
7/34 · Low
Exposure
5/34 · Minimal