GLSA-200407-14 : Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200407-14
(Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries)

The Unreal-based game servers support a specific type of query called
'secure'. Part of the Gamespy protocol, this query is used to ask if the
game server is able to calculate an exact response using a provided string.
Luigi Auriemma found that sending a long 'secure' query triggers a buffer
overflow in the game server.

Impact :

By sending a malicious UDP-based 'secure' query, an attacker could execute
arbitrary code on the game server.

Workaround :

Users can avoid this vulnerability by not using Unreal Tournament to host
games as a server. All users running a server should upgrade to the latest

See also :

Solution :

All Unreal Tournament users should upgrade to the latest available
# emerge sync
# emerge -pv '>=games-fps/ut2003-2225-r3'
# emerge '>=games-fps/ut2003-2225-r3'
# emerge -pv '>=games-server/ut2003-ded-2225-r2'
# emerge '>=games-server/ut2003-ded-2225-r2'
# emerge -pv '>=games-fps/ut2004-3236'
# emerge '>=games-fps/ut2004-3236'
# emerge -pv '>=games-fps/ut2004-demo-3120-r4'
# emerge '>=games-fps/ut2004-demo-3120-r4'

Risk factor :

Critical / CVSS Base Score : 10.0
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 14547 (gentoo_GLSA-200407-14.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0608

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now