Vulnerabilities > CVE-2003-0685 - Unspecified vulnerability in Netris 0.3/0.4/0.5

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
netris
nessus

Summary

Buffer overflow in Netris 0.52 and earlier, and possibly other versions, allows remote malicious Netris servers to execute arbitrary code on netris clients via a long server response.

Vulnerable Configurations

Part Description Count
Application
Netris
3

Nessus

NASL familyDebian Local Security Checks
NASL idDEBIAN_DSA-372.NASL
descriptionShaun Colley discovered a buffer overflow vulnerability in netris, a network version of a popular puzzle game. A netris client connecting to an untrusted netris server could be sent an unusually long data packet, which would be copied into a fixed-length buffer without bounds checking. This vulnerability could be exploited to gain the privileges of the user running netris in client mode, if they connect to a hostile netris server.
last seen2020-06-01
modified2020-06-02
plugin id15209
published2004-09-29
reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15209
titleDebian DSA-372-1 : netris - buffer overflow