Family: Debian Local Security Checks --> Category: infos
[DSA372] DSA-372-1 netris Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Shaun Colley discovered a buffer overflow vulnerability in netris, a
network version of a popular puzzle game. A netris client connecting
to an untrusted netris server could be sent an unusually long data
packet, which would be copied into a fixed-length buffer without
bounds checking. This vulnerability could be exploited to gain the
rights of the user running netris in client mode, if they connect
to a hostile netris server.
For the current stable distribution (woody) this problem has been fixed
in version 0.5-4woody1.
For the unstable distribution (sid) this problem is fixed in version
We recommend that you update your netris package.
Solution : http://www.debian.org/security/2003/dsa-372
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.