2024-07-14 02:06:08 +00:00

164 lines
4.9 KiB
JSON

{
"id": "CVE-2006-1390",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-03-25T00:06:00.000",
"lastModified": "2018-10-18T16:32:26.747",
"vulnStatus": "Modified",
"cveTags": [],
"evaluatorSolution": "This vulnerability applies only to the following games/versions: \r\n1) NetHack 3.4.3-r1 and previous \r\n2) Falcon's Eye 1.9.4a and previous \r\n3) Slash'EM 0.0.760 and previous",
"descriptions": [
{
"lang": "en",
"value": "The configuration of NetHack 3.4.3-r1 and earlier, Falcon's Eye 1.9.4a and earlier, and Slash'EM 0.0.760 and earlier on Gentoo Linux allows local users in the games group to modify saved games files to execute arbitrary code via buffer overflows and overwrite arbitrary files via symlink attacks."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "980553F2-8662-47CF-95F0-645141746AEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "40EBF1CD-B392-4262-8F06-2C784ADAF0F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9C00F84A-FCD4-4935-B7DE-ECBA6AE9B074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "960DC6C2-B285-41D4-96F7-ED97F8BD5482"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D1FD0EB4-E744-4465-AFEE-A3C807C9C993"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "57772E3B-893C-408A-AA3B-78C972ED4D5E"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=122376",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=125902",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=127167",
"source": "cve@mitre.org"
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=127319",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/19376",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200603-23.xml",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.osvdb.org/24104",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/428739/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/428743/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/17217",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25528",
"source": "cve@mitre.org"
}
]
}