First published: Sat Mar 25 2006(Updated: )
The configuration of NetHack 3.4.3-r1 and earlier, Falcon's Eye 1.9.4a and earlier, and Slash'EM 0.0.760 and earlier on Gentoo Linux allows local users in the games group to modify saved games files to execute arbitrary code via buffer overflows and overwrite arbitrary files via symlink attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Linux | =1.4-rc1 | |
Gentoo Linux | =1.4-rc3 | |
Gentoo Linux | =0.5 | |
Gentoo Linux | =1.1a | |
Gentoo Linux | =1.4 | |
Gentoo Linux | =0.7 | |
Gentoo Linux | =1.2 | |
Gentoo Linux | =1.4-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1390 is considered a high-severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2006-1390, update to a version of NetHack, Falcon's Eye, or Slash'EM that is not affected by the vulnerability.
CVE-2006-1390 affects local users in the games group on Gentoo Linux who have access to the vulnerable game files.
CVE-2006-1390 can be exploited via buffer overflows and symlink attacks leading to arbitrary file modification and code execution.
Gentoo Linux versions 1.1a, 1.2, 1.4 (including release candidates), and 0.5-0.7 are affected by CVE-2006-1390.