Vulnerability Description
In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nethack | Nethack | < 3.6.5 |
Related Weaknesses (CWE)
References
- https://github.com/NetHack/NetHack/commit/f3def5c0b999478da2d0a8f0b6a7c370a2065fPatch
- https://github.com/NetHack/NetHack/security/advisories/GHSA-v5pg-hpjg-9rppThird Party Advisory
- https://github.com/NetHack/NetHack/commit/f3def5c0b999478da2d0a8f0b6a7c370a2065fPatch
- https://github.com/NetHack/NetHack/security/advisories/GHSA-v5pg-hpjg-9rppThird Party Advisory
FAQ
What is CVE-2020-5210?
CVE-2020-5210 is a vulnerability with a CVSS score of 5.0 (MEDIUM). In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects sy...
How severe is CVE-2020-5210?
CVE-2020-5210 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5210?
Check the references section above for vendor advisories and patch information. Affected products include: Nethack Nethack.