Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: 'nethack' buffer overflow Print E-mail
User Rating:      How can I rate this item?
Posted by Team   
Debian The nethack package is vulnerable to a buffer overflow exploited via a long '-s' command line option. This vulnerability could be used by an attacker to gain gid 'games' on a system where nethack is installed.

Debian Security Advisory DSA 316-1                                        Matt Zimmerman
June 11th, 2003                

Package        : nethack
Vulnerability  : buffer overflow, incorrect permissions
Problem-Type   : local
Debian-specific: no
CVE Id         : CAN-2003-0358 CAN-2003-0359

The nethack package is vulnerable to a buffer overflow exploited via a
long '-s' command line option.  This vulnerability could be used by an
attacker to gain gid 'games' on a system where nethack is installed.

Additionally, some setgid binaries in the nethack package have
incorrect permissions, which could allow a user who gains gid 'games'
to replace these binaries, potentially causing other users to execute
malicious code when they run nethack.

For the stable distribution (woody) these problems have been fixed in
version 3.4.0-3.0woody3.

For the old stable distribution (potato) problem xxx has been fixed in
version 3.3.0-7potato1.

For the unstable distribution (sid) these problems are fixed in
version 3.4.1-1.

We recommend that you update your nethack package.

Upgrade Instructions

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

Debian GNU/Linux 2.2 alias potato

  Source archives:
      Size/MD5 checksum:      655 6457b20023bb6993cf7b67eb3d6a1f92
      Size/MD5 checksum:    18692 13ac890591e25dab8ceed16f72e1f471
      Size/MD5 checksum:  2887417 cf9f4039408321f39c3ef733455cb73a

  Alpha architecture:
      Size/MD5 checksum:  1398066 713fcbb55b30327e41e27d6bcb6d607b

  ARM architecture:
      Size/MD5 checksum:  1117428 73c2db664578473ef6659cab5cc4d6ef

  Intel IA-32 architecture:
      Size/MD5 checksum:  1022056 db40676e291e8df8a4e361bcbfffe7bf

  Motorola 680x0 architecture:
      Size/MD5 checksum:   978610 2b11d697920115da6d6221ff0a561c28

  PowerPC architecture:
      Size/MD5 checksum:  1128166 97049fd8d1f264630e8388646f5b35e0

  Sun Sparc architecture:
      Size/MD5 checksum:  1148254 a4ca25a566409ce3ff5bb84dc68b7b15

Debian GNU/Linux 3.0 alias woody

  Source archives:
      Size/MD5 checksum:      748 3b19c11e859addf7387327edc9919dda
      Size/MD5 checksum:    67431 178cb16dc35eba59d3f2cb8d9bcc82c9
      Size/MD5 checksum:  3270905 0093f14fbbe449d5b188bfb6aa4eae4f

  Architecture independent components:
      Size/MD5 checksum:    12996 adc0f1e825fbaf6d051ebe9ce6d113fd

  Alpha architecture:
      Size/MD5 checksum:   448546 e22a529c9f6dd56f754e65c143e888bf
      Size/MD5 checksum:  1159370 7cb61bf9e18ab76ea49e8f5d07789b86
      Size/MD5 checksum:  1166088 9a04f218f4f12986991f231f32d78657
      Size/MD5 checksum:  1099536 4ade2cb58891fbf4612861e621de668a

  ARM architecture:
      Size/MD5 checksum:   430974 73bb44aa965b99c8dc95dab7789aba7b
      Size/MD5 checksum:   891296 68a140761542ca2047adfd77ccee72c9
      Size/MD5 checksum:   908178 b5c7b5764ff27dffa7228848cacbf7c6
      Size/MD5 checksum:   826270 9090d14c531d1d6cd5ec555742aa39dc

  Intel IA-32 architecture:
      Size/MD5 checksum:   427996 cbd2cccef376e1986d3d30489ef41f46
      Size/MD5 checksum:   790660 6fc1683852e67991d7b8326313d3dada
      Size/MD5 checksum:   812066 bd0720e9b7ff4394388557628a782552
      Size/MD5 checksum:   722422 3e25c8e6abe0da37c38b18819ba41231

  HP Precision architecture:
      Size/MD5 checksum:   437252 4814c05bfe6becaa61d765c5e16d960b
      Size/MD5 checksum:  1028208 f3786ca02d6e4a2addc838713c72b541
      Size/MD5 checksum:  1050072 a7e2a4df3d68b695a8f115a07d02745c
      Size/MD5 checksum:   964926 c52414ef50a612a375c50f62f32a9910

  Motorola 680x0 architecture:
      Size/MD5 checksum:   425090 d6f27579b87dc04bbdf3027e03d31c21
      Size/MD5 checksum:   744130 6c9d59e42180972c686e9588c34a0dc3
      Size/MD5 checksum:   759848 25f8e9bf0bfc3bb214cf44aa53551bb7
      Size/MD5 checksum:   677096 1a8fee87a24e387b4cccc82047f56154

  Big endian MIPS architecture:
      Size/MD5 checksum:   437234 285bc9f5ecf31dc795b36d6d3938c198
      Size/MD5 checksum:   913234 8307a4a58da664337ffea071f9cfedb3
      Size/MD5 checksum:   962694 1f2157ea26bb522e53acadc8474c4b3b
      Size/MD5 checksum:   884232 d10f2486bdd53389c34be664fbbebf62

  Little endian MIPS architecture:
      Size/MD5 checksum:   436524 df00a3c0227ddeeb6784b40098be977e
      Size/MD5 checksum:   915438 1d4751a80d3a3b7c1856d3c11e3c42be
      Size/MD5 checksum:   960486 6eca0d12e7dcb0c2b048074897ce0633
      Size/MD5 checksum:   885692 ab561bd3c0d59511cd64bb562504d32a

  PowerPC architecture:
      Size/MD5 checksum:   433282 44392c68c6c4642d13a8477e43888edc
      Size/MD5 checksum:   894054 8caa102c4fc9eaebe14b07573c64e8d6
      Size/MD5 checksum:   895404 a23e819c3810747f7133e7716a4c67f1
      Size/MD5 checksum:   829348 9ac4bfbec280ba184f53ea25a985423d

  IBM S/390 architecture:
      Size/MD5 checksum:   431388 184539e76b551bf4fc906f1b79a582cf
      Size/MD5 checksum:   872456 9e731f496af24534688fae59e7f24045
      Size/MD5 checksum:   876436 7de38b1345a4a25a875ee8126a4f4200
      Size/MD5 checksum:   807628 d2388393e737ac21317a3e559566ec0d

  Sun Sparc architecture:
      Size/MD5 checksum:   440772 ef35b8dc5cc1abbb0276d724656f68c8
      Size/MD5 checksum:   911986 0b2eee94e97f64b49f2cd3ff072dc2fa
      Size/MD5 checksum:   912976 b690faf77cd6a932200779ca36763c95
      Size/MD5 checksum:   847972 3668f6f14f7924b1446fad9591bd1abb

You may use an automated update by adding the resources from the
footer to the proper configuration.

For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show ' and

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.