GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Feb 06, 2008 11:26 pm Post subject: [ GLSA 200802-02 ] Doomsday: Multiple vulnerabilities |
|
|
Gentoo Linux Security Advisory
Title: Doomsday: Multiple vulnerabilities (GLSA 200802-02)
Severity: high
Exploitable: remote
Date: February 06, 2008
Updated: February 10, 2008
Bug(s): #190835
ID: 200802-02
Synopsis
Multiple vulnerabilities in Doomsday might allow remote execution of arbitrary code or a Denial of Service.
Background
The Doomsday Engine (deng) is a modern gaming engine for popular ID games like Doom, Heretic and Hexen.
Affected Packages
Package: games-fps/doomsday
Vulnerable: <= 1.9.0_beta52
Architectures: All supported architectures
Description
Luigi Auriemma discovered multiple buffer overflows in the D_NetPlayerEvent() function, the Msg_Write() function and the NetSv_ReadCommands() function. He also discovered errors when handling chat messages that are not NULL-terminated (CVE-2007-4642) or contain a short data length, triggering an integer underflow (CVE-2007-4643). Furthermore a format string vulnerability was discovered in the Cl_GetPackets() function when processing PSV_CONSOLE_TEXT messages (CVE-2007-4644).
Impact
A remote attacker could exploit these vulnerabilities to execute arbitrary code with the rights of the user running the Doomsday server or cause a Denial of Service by sending specially crafted messages to the server.
Workaround
There is no known workaround at this time.
Resolution
While some of these issues could be resolved in "games-fps/doomsday-1.9.0-beta5.2", the format string vulnerability (CVE-2007-4644) remains unfixed. We recommend that users unmerge Doomsday: Code: | # emerge --unmerge games-fps/doomsday |
References
CVE-2007-4642
CVE-2007-4643
CVE-2007-4644
Last edited by GLSA on Mon Feb 11, 2008 4:18 am; edited 1 time in total |
|