Lucene search

K

Debian Security Advisory DSA 127-1 (xpilot)

🗓️ 17 Jan 2008 00:00:00Reported by Copyright (C) 2008 E-Soft Inc.Type 
openvas
 openvas
🔗 plugins.openvas.org👁 4 Views

Debian Security Advisory DSA 127-1 xpilot buffer overflow vulnerabilit

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2002-0179
25 Jun 200204:00
cvelist
CVE
CVE-2002-0179
25 Jun 200204:00
cve
OpenVAS
Debian Security Advisory DSA 127-1 (xpilot)
17 Jan 200800:00
openvas
NVD
CVE-2002-0179
22 Apr 200204:00
nvd
Tenable Nessus
Debian DSA-127-1 : xpilot-server - remote buffer overflow
29 Sep 200400:00
nessus
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.53845");
  script_cve_id("CVE-2002-0179");
  script_version("2023-07-19T05:05:15+0000");
  script_tag(name:"last_modification", value:"2023-07-19 05:05:15 +0000 (Wed, 19 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-01-17 22:24:46 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_name("Debian Security Advisory DSA 127-1 (xpilot)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("Debian Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB2\.2");
  script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20127-1");
  script_tag(name:"insight", value:"An internal audit by the xpilot (a multi-player tactical manoeuvring
game for X) maintainers revealed a buffer overflow in xpilot server.
This overflow can be abused by remote attackers to gain access to
the server under which the xpilot server is running.

This has been fixed in upstream version 4.5.1 and version
4.1.0-4.U.4alpha2.4.potato1 of the Debian package.");
  script_tag(name:"summary", value:"The remote host is missing an update to xpilot
announced via advisory DSA 127-1.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution", value:"Please install the updated package(s).");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

res = "";
report = "";
if((res = isdpkgvuln(pkg:"xpilot", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
  report += res;
}
if((res = isdpkgvuln(pkg:"xpilot-client-nas", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
  report += res;
}
if((res = isdpkgvuln(pkg:"xpilot-client-nosound", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
  report += res;
}
if((res = isdpkgvuln(pkg:"xpilot-client-rplay", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
  report += res;
}
if((res = isdpkgvuln(pkg:"xpilot-server", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
  report += res;
}

if(report != "") {
  security_message(data:report);
} else if(__pkg_match) {
  exit(99);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Jan 2008 00:00Current
7.2High risk
Vulners AI Score7.2
CVSS27.5
EPSS0.06818
4
.json
Report