|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200407-14] Unreal Tournament 2003/2004: Buffer overflow in \'secure\' queries Vulnerability Scan
Vulnerability Scan Summary Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200407-14
(Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries)
The Unreal-based game servers support a specific type of query called
'secure'. Part of the Gamespy protocol, this query is used to ask if the
game server is able to calculate an exact response using a provided string.
Luigi Auriemma found that sending a long 'secure' query triggers a buffer
overflow in the game server.
Impact
By sending a malicious UDP-based 'secure' query, a possible hacker could execute
arbitrary code on the game server.
Workaround
Users can avoid this vulnerability by not using Unreal Tournament to host
games as a server. All users running a server should upgrade to the latest
versions.
References:
http://aluigi.altervista.org/adv/unsecure-adv.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0608
Solution:
All Unreal Tournament users should upgrade to the latest available
versions:
# emerge sync
# emerge -pv ">=games-fps/ut2003-2225-r3"
# emerge ">=games-fps/ut2003-2225-r3"
# emerge -pv ">=games-server/ut2003-ded-2225-r2"
# emerge ">=games-server/ut2003-ded-2225-r2"
# emerge -pv ">=games-fps/ut2004-3236"
# emerge ">=games-fps/ut2004-3236"
# emerge -pv ">=games-fps/ut2004-demo-3120-r4"
# emerge ">=games-fps/ut2004-demo-3120-r4"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|