FreeBSD : wesnoth -- Code Injection vulnerability (bad59128-c188-11e8-9d40-f0def10dca57)

high Nessus Plugin ID 117723

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

shadowm reports :

A severe bug was found in the game client which could allow a malicious user to execute arbitrary code through the Lua engine by using specially crafted code in add-ons, saves, replays, or networked games. This issue affects all platforms and all existing releases since Wesnoth version 1.7.0. Users of all previous version should upgrade immediately.

Solution

Update the affected package.

See Also

https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380

http://www.nessus.org/u?bfc1399e

Plugin Details

Severity: High

ID: 117723

File Name: freebsd_pkg_bad59128c18811e89d40f0def10dca57.nasl

Version: 1.3

Type: local

Published: 9/27/2018

Updated: 3/21/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-1999023

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:wesnoth, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 9/26/2018

Vulnerability Publication Date: 7/14/2018

Reference Information

CVE: CVE-2018-1999023