Lucene search

K
gentooGentoo FoundationGLSA-200802-02
HistoryFeb 06, 2008 - 12:00 a.m.

Doomsday: Multiple vulnerabilities

2008-02-0600:00:00
Gentoo Foundation
security.gentoo.org
8

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.213 Low

EPSS

Percentile

96.4%

Background

The Doomsday Engine (deng) is a modern gaming engine for popular ID games like Doom, Heretic and Hexen.

Description

Luigi Auriemma discovered multiple buffer overflows in the D_NetPlayerEvent() function, the Msg_Write() function and the NetSv_ReadCommands() function. He also discovered errors when handling chat messages that are not NULL-terminated (CVE-2007-4642) or contain a short data length, triggering an integer underflow (CVE-2007-4643). Furthermore a format string vulnerability was discovered in the Cl_GetPackets() function when processing PSV_CONSOLE_TEXT messages (CVE-2007-4644).

Impact

A remote attacker could exploit these vulnerabilities to execute arbitrary code with the rights of the user running the Doomsday server or cause a Denial of Service by sending specially crafted messages to the server.

Workaround

There is no known workaround at this time.

Resolution

While some of these issues could be resolved in “games-fps/doomsday-1.9.0-beta5.2”, the format string vulnerability (CVE-2007-4644) remains unfixed. We recommend that users unmerge Doomsday:

 # emerge --unmerge games-fps/doomsday
OSVersionArchitecturePackageVersionFilename
Gentooanyallgames-fps/doomsday<= 1.9.0_beta52UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.213 Low

EPSS

Percentile

96.4%

Related for GLSA-200802-02