GLSA-200608-16 : Warzone 2100 Resurrection: Multiple buffer overflows

high Nessus Plugin ID 22215

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200608-16 (Warzone 2100 Resurrection: Multiple buffer overflows)

Luigi Auriemma discovered two buffer overflow vulnerabilities in Warzone 2100 Resurrection. The recvTextMessage function of the Warzone 2100 Resurrection server and the NETrecvFile function of the client use insufficiently sized buffers.
Impact :

A remote attacker could exploit these vulnerabilities by sending specially crafted input to the server, or enticing a user to load a specially crafted file from a malicious server. This may result in the execution of arbitrary code with the permissions of the user running Warzone 2100 Resurrection.
Workaround :

There is no known workaround for this issue.
There is no known workaround at this time.

Solution

All Warzone 2100 Resurrection users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=games-strategy/warzone2100-2.0.4'

See Also

https://security.gentoo.org/glsa/200608-16

Plugin Details

Severity: High

ID: 22215

File Name: gentoo_GLSA-200608-16.nasl

Version: 1.14

Type: local

Published: 8/14/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:warzone2100, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 8/10/2006

Vulnerability Publication Date: 7/23/2006

Reference Information

CVE: CVE-2006-3849

GLSA: 200608-16