Lucene search

K
gentooGentoo FoundationGLSA-200604-05
HistoryApr 06, 2006 - 12:00 a.m.

Doomsday: Format string vulnerability

2006-04-0600:00:00
Gentoo Foundation
security.gentoo.org
6

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.621 Medium

EPSS

Percentile

97.8%

Background

Doomsday is a modern gaming engine for popular ID games like Doom, Heretic and Hexen.

Description

Luigi Auriemma discovered that Doomsday incorrectly implements formatted printing.

Impact

A remote attacker could exploit these vulnerabilities to execute arbitrary code with the rights of the user running the Doomsday server or client by sending specially crafted strings.

Workaround

There is no known workaround at this time.

Resolution

All Doomsday users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=games-fps/doomsday-1.9.0_beta4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallgames-fps/doomsday<= 1.9.0_beta4UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.621 Medium

EPSS

Percentile

97.8%

Related for GLSA-200604-05