|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200702-10] UFO2000: Multiple vulnerabilities Vulnerability Scan
Vulnerability Scan Summary UFO2000: Multiple vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200702-10
(UFO2000: Multiple vulnerabilities)
Five vulnerabilities were found: a buffer overflow in recv_add_unit()
a problem with improperly trusting user-supplied string information in
decode_stringmap()
several issues with array manipulation via various
commands during play
an SQL injection in server_protocol.cpp
and
finally, a second buffer overflow in recv_map_data().
Impact
A possible hacker could send crafted network traffic as part of a
multi-player game that could result in remote code execution on the
remote opponent or the server. A remote attacker could also run
arbitrary SQL queries against the server account database, and perform
a Denial of Service on a remote opponent by causing the game to crash.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3792
http://www.gentoo.org/security/en/glsa/glsa-200608-14.xml
Solution:
UFO2000 currently depends on the dumb-0.9.2 library, which has been
removed from portage due to security problems (GLSA 200608-14) .
Because of this, UFO2000 has been masked, and we recommend unmerging
the package until the next beta release can remove the dependency on
dumb.
# emerge --ask --verbose --unmerge ufo2000
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|