Lucene search

K
gentooGentoo FoundationGLSA-200605-12
HistoryMay 10, 2006 - 12:00 a.m.

Quake 3 engine based games: Buffer Overflow

2006-05-1000:00:00
Gentoo Foundation
security.gentoo.org
16

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

EPSS

0.056

Percentile

93.3%

Background

Quake 3 is a multiplayer first person shooter.

Description

landser discovered a vulnerability within the “remapShader” command. Due to a boundary handling error in “remapShader”, there is a possibility of a buffer overflow.

Impact

An attacker could set up a malicious game server and entice users to connect to it, potentially resulting in the execution of arbitrary code with the rights of the game user.

Workaround

Do not connect to untrusted game servers.

Resolution

All Quake 3 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=games-fps/quake3-bin-1.32c"

All RTCW users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=games-fps/rtcw-1.41b"

All Enemy Territory users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=games-fps/enemy-territory-2.60b"

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

EPSS

0.056

Percentile

93.3%