Vulnerabilities > CVE-2004-0103 - Unspecified vulnerability in Linley Henzell Crawl
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN linley-henzell
nessus
Summary
crawl before 4.0.0 beta23 does not properly "apply a size check" when copying a certain environment variable, which may allow local users to gain privileges, possibly as a result of a buffer overflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-432.NASL |
description | Steve Kemp from the Debian Security Audit Project discovered a problem in crawl, another console based dungeon exploration game, in the vein of nethack and rogue. The program uses several environment variables as inputs but doesn |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15269 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15269 |
title | Debian DSA-432-1 : crawl - buffer overflow |
code |
|
References
- http://secunia.com/advisories/10788/
- http://secunia.com/advisories/10788/
- http://www.debian.org/security/2004/dsa-432
- http://www.debian.org/security/2004/dsa-432
- http://www.securityfocus.com/bid/9566
- http://www.securityfocus.com/bid/9566
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15032
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15032