Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200407-14] Unreal Tournament 2003/2004: Buffer overflow in \'secure\' queries Vulnerability Scan
Vulnerability Scan Summary
Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200407-14
(Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries)
The Unreal-based game servers support a specific type of query called
'secure'. Part of the Gamespy protocol, this query is used to ask if the
game server is able to calculate an exact response using a provided string.
Luigi Auriemma found that sending a long 'secure' query triggers a buffer
overflow in the game server.
By sending a malicious UDP-based 'secure' query, a possible hacker could execute
arbitrary code on the game server.
Users can avoid this vulnerability by not using Unreal Tournament to host
games as a server. All users running a server should upgrade to the latest
All Unreal Tournament users should upgrade to the latest available
# emerge sync
# emerge -pv ">=games-fps/ut2003-2225-r3"
# emerge ">=games-fps/ut2003-2225-r3"
# emerge -pv ">=games-server/ut2003-ded-2225-r2"
# emerge ">=games-server/ut2003-ded-2225-r2"
# emerge -pv ">=games-fps/ut2004-3236"
# emerge ">=games-fps/ut2004-3236"
# emerge -pv ">=games-fps/ut2004-demo-3120-r4"
# emerge ">=games-fps/ut2004-demo-3120-r4"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.