|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200602-09] BomberClone: Remote execution of arbitrary code Vulnerability Scan
Vulnerability Scan Summary BomberClone: Remote execution of arbitrary code
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200602-09
(BomberClone: Remote execution of arbitrary code)
Stefan Cornelius of the Gentoo Security team discovered multiple
missing buffer checks in BomberClone's code.
Impact
By sending overly long error messages to the game via network, a
remote attacker may exploit buffer overflows to execute arbitrary code
with the rights of the user running BomberClone.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0460
Solution:
All BomberClone users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=games-action/bomberclone-0.11.6.2-r1"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|