Gentoo alert: Scorched 3D server chat box format string vulnerability

Posted by dave on Apr 9, 2004 5:41 AM EDT
Mailing list; By Kurt Lieber <klieber@gentoo.org>
Mail this story
Print this story

Scorched 3D is vulnerable to a format string attack in the chat box that leads to Denial of Service on the game server and possibly allows execution of arbitrary code.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200404-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                             http://security.gentoo.org
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: High Title: Scorched 3D server chat box format string vulnerability

Date: April 09, 2004 Bugs: #39302 ID: 200404-12

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis ========

Scorched 3D is vulnerable to a format string attack in the chat box that leads to Denial of Service on the game server and possibly allows execution of arbitrary code.

Background ==========

Scorched 3D is a game based loosely on the classic DOS game "Scorched Earth". Scorched 3D adds amongst other new features a 3D island environment and LAN and internet play. Scorched 3D is totally free and is available for multiple operating systems.

Affected packages =================

------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- games-strategy/scorched3d < 37 >= 37

Description ===========

Scorched 3D (build 36.2 and before) does not properly check the text entered in the Chat box (T key). Using format string characters, you can generate a heap overflow. This and several other unchecked buffers have been corrected in the build 37 release.

Impact ======

This vulnerability can be easily exploited to remotely crash the Scorched 3D server, disconnecting all clients. It could also theorically be used to execute arbitrary code on the server with the rights of the user running the server.

Workaround ==========

A workaround is not currently known for this issue. All users are advised to upgrade to the latest version of the affected package.

Resolution ==========

Scorched 3D users should upgrade to version 37 or later:

# emerge sync

# emerge -pv ">=games-strategy/scorched3d-37" # emerge ">=games-strategy/scorched3d-37"

Availability ============

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200404-12.xml

Concerns? =========

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to [e-mail:security@gentoo.org] or alternatively, you may file a bug at http://bugs.gentoo.org.

License =======

Copyright 2004 Gentoo Technologies, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/1.0

[PARSEASHTML]

  Nav
» Read more about: Story Type: Security; Groups: Gentoo

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.