Debian Security Advisory DSA 127-1 xpilot buffer overflow vulnerabilit
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2002-0179 | 25 Jun 200204:00 | – | cvelist |
![]() | CVE-2002-0179 | 25 Jun 200204:00 | – | cve |
![]() | Debian Security Advisory DSA 127-1 (xpilot) | 17 Jan 200800:00 | – | openvas |
![]() | CVE-2002-0179 | 22 Apr 200204:00 | – | nvd |
![]() | Debian DSA-127-1 : xpilot-server - remote buffer overflow | 29 Sep 200400:00 | – | nessus |
Source | Link |
---|---|
secure1 | www.secure1.securityspace.com/smysecure/catid.html |
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.53845");
script_cve_id("CVE-2002-0179");
script_version("2023-07-19T05:05:15+0000");
script_tag(name:"last_modification", value:"2023-07-19 05:05:15 +0000 (Wed, 19 Jul 2023)");
script_tag(name:"creation_date", value:"2008-01-17 22:24:46 +0100 (Thu, 17 Jan 2008)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("Debian Security Advisory DSA 127-1 (xpilot)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 E-Soft Inc.");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB2\.2");
script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20127-1");
script_tag(name:"insight", value:"An internal audit by the xpilot (a multi-player tactical manoeuvring
game for X) maintainers revealed a buffer overflow in xpilot server.
This overflow can be abused by remote attackers to gain access to
the server under which the xpilot server is running.
This has been fixed in upstream version 4.5.1 and version
4.1.0-4.U.4alpha2.4.potato1 of the Debian package.");
script_tag(name:"summary", value:"The remote host is missing an update to xpilot
announced via advisory DSA 127-1.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
res = "";
report = "";
if((res = isdpkgvuln(pkg:"xpilot", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"xpilot-client-nas", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"xpilot-client-nosound", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"xpilot-client-rplay", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"xpilot-server", ver:"4.1.0-4.U.4alpha2.4.potato1", rls:"DEB2.2")) != NULL) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo