This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Two buffer overflow vulnerabilities where detected. Both issues can be
used by local users to gain group games privileges on affected
The first overflow exists in the map name handling and can be
triggered when a very long name is given to the program during
The second overflow exists in the username processing while writing
the players score to disk. Excessivly long usernames, set via the USER
environment variable, are stored without any length checks in a memory
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 4.6