This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200603-26
(bsd-games: Local privilege escalation in tetris-bsd)
Tavis Ormandy of the Gentoo Linux Security Audit Team discovered that
the checkscores() function in scores.c reads in the data from the
/var/games/tetris-bsd.scores file without validation, rendering it
vulnerable to buffer overflows and incompatible with the system used
for managing games on Gentoo Linux. As a result, it cannot be played
securely on systems with multiple users. Please note that this is
probably a Gentoo-specific issue.
A local user who is a member of group 'games' may be able to modify the
tetris-bsd.scores file to trigger the execution of arbitrary code with
the privileges of other players.
Do not add untrusted users to the 'games' group.
See also :
All bsd-games users are advised to update to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=games-misc/bsd-games-2.17-r1'
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 21166 (gentoo_GLSA-200603-26.nasl)
CVE ID: CVE-2006-1539
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.