|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200509-03] OpenTTD: Format string vulnerabilities Vulnerability Scan
Vulnerability Scan Summary OpenTTD: Format string vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200509-03
(OpenTTD: Format string vulnerabilities)
Alexey Dobriyan discovered several format string vulnerabilities
in OpenTTD.
Impact
A remote attacker could exploit these vulnerabilities to crash the
OpenTTD server or client and possibly execute arbitrary code with the
rights of the user running OpenTTD.
Workaround
There are no known workarounds at this time.
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2763
Solution:
All OpenTTD users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.4.0.1-r1"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|