GLSA-200608-16 : Warzone 2100 Resurrection: Multiple buffer overflows

High Nessus Plugin ID 22215


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200608-16 (Warzone 2100 Resurrection: Multiple buffer overflows)

Luigi Auriemma discovered two buffer overflow vulnerabilities in Warzone 2100 Resurrection. The recvTextMessage function of the Warzone 2100 Resurrection server and the NETrecvFile function of the client use insufficiently sized buffers.
Impact :

A remote attacker could exploit these vulnerabilities by sending specially crafted input to the server, or enticing a user to load a specially crafted file from a malicious server. This may result in the execution of arbitrary code with the permissions of the user running Warzone 2100 Resurrection.
Workaround :

There is no known workaround for this issue.
There is no known workaround at this time.


All Warzone 2100 Resurrection users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=games-strategy/warzone2100-2.0.4'

See Also

Plugin Details

Severity: High

ID: 22215

File Name: gentoo_GLSA-200608-16.nasl

Version: $Revision: 1.11 $

Type: local

Published: 2006/08/14

Modified: 2015/04/13

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:warzone2100, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2006/08/10

Vulnerability Publication Date: 2006/07/23

Reference Information

CVE: CVE-2006-3849

OSVDB: 27910, 27911

GLSA: 200608-16