This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200702-10
(UFO2000: Multiple vulnerabilities)
Five vulnerabilities were found: a buffer overflow in recv_add_unit();
a problem with improperly trusting user-supplied string information in
decode_stringmap(); several issues with array manipulation via various
commands during play; a SQL injection in server_protocol.cpp; and
finally, a second buffer overflow in recv_map_data().
An attacker could send crafted network traffic as part of a
multi-player game that could result in remote code execution on the
remote opponent or the server. A remote attacker could also run
arbitrary SQL queries against the server account database, and perform
a Denial of Service on a remote opponent by causing the game to crash.
There is no known workaround at this time.
See also :
UFO2000 currently depends on the dumb-0.9.2 library, which has been
removed from portage due to security problems (GLSA 200608-14) .
Because of this, UFO2000 has been masked, and we recommend unmerging
the package until the next beta release can remove the dependency on
# emerge --ask --verbose --unmerge ufo2000
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 24722 (gentoo_GLSA-200702-10.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now