Batalla Naval gbnserver Remote Overflow

high Nessus Plugin ID 11651

Language:

Synopsis

The game server running on the remote host has a buffer overflow vulnerability.

Description

The remote host is running Batalla Naval, a networked multiplayer battleship game.

This version has a remote buffer overflow vulnerability. A remote attacker could exploit this to crash the service, or possibly execute arbitrary code.

Solution

Disable this service, or only allow trusted systems to connect.

See Also

https://seclists.org/bugtraq/2003/May/276

Plugin Details

Severity: High

ID: 11651

File Name: batalla_server_overflow.nasl

Version: 1.17

Type: remote

Published: 5/27/2003

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:gnome:batalla_naval

Required KB Items: Settings/ParanoidReport

Vulnerability Publication Date: 5/26/2003

Reference Information

CVE: CVE-2003-0407