By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.# CVE-2003-0358
_Posting for historical reasons._
> * snowcrash
> * snowcra5h@icloud.com
> * https://github.com/snowcra5h/
## Description
> _Buffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges > via a long -s command line option._
## References
- https://www.exploit-db.com/?author=4939
- https://nvd.nist.gov/vuln/detail/CVE-2003-0358
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11283
- http://nethack.sourceforge.net/v340/bugmore/secpatch.txt
- http://www.debian.org/security/2003/dsa-316
- http://www.debian.org/security/2003/dsa-350
- http://www.securityfocus.com/archive/1/311172/2003-02-08/2003-02-14/0
- http://www.securityfocus.com/bid/6806
[4.0K] /data/pocs/9c5cbe465bcc64afa681e5724419e798215d5a07
├── [1.0K] CVE-2003-0358.c
├── [ 708] CVE-2003-0358.pl
└── [ 765] README.md
0 directories, 3 files