Vulnerabilities > CVE-2006-1744 - Unspecified vulnerability in Joey Hess Bsdgames
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN joey-hess
nessus
Summary
Buffer overflow in pl_main.c in sail in BSDgames before 2.17-7 allows local users to execute arbitrary code via a long player name that is used in a scanf function call.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-1036.NASL |
description | A buffer overflow problem has been discovered in sail, a game contained in the bsdgames package, a collection of classic textual Unix games, which could lead to games group privilege escalation. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22578 |
published | 2006-10-14 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22578 |
title | Debian DSA-1036-1 : bsdgames - buffer overflow |
code |
|
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=360989
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=360989
- http://secunia.com/advisories/19687
- http://secunia.com/advisories/19687
- http://securityreason.com/securityalert/736
- http://securityreason.com/securityalert/736
- http://www.debian.org/security/2006/dsa-1036
- http://www.debian.org/security/2006/dsa-1036
- http://www.osvdb.org/24634
- http://www.osvdb.org/24634
- http://www.pulltheplug.org/fu/?q=node/56
- http://www.pulltheplug.org/fu/?q=node/56
- http://www.securityfocus.com/bid/17401
- http://www.securityfocus.com/bid/17401