Lucene search

K
osvGoogleOSV:DSA-1737-1
HistoryMar 11, 2009 - 12:00 a.m.

wesnoth - several vulnerabilities

2009-03-1100:00:00
Google
osv.dev
5

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.39 Low

EPSS

Percentile

96.7%

Several security issues have been discovered in wesnoth, a fantasy
turn-based strategy game. The Common Vulnerabilities and Exposures
project identifies the following problems:

  • CVE-2009-0366
    Daniel Franke discovered that the wesnoth server is prone to a denial of
    service attack when receiving special crafted compressed data.
  • CVE-2009-0367
    Daniel Franke discovered that the sandbox implementation for the python
    AIs can be used to execute arbitrary python code on wesnoth clients. In
    order to prevent this issue, the python support has been disabled. A
    compatibility patch was included, so that the affected campagne is still
    working properly.

For the stable distribution (lenny), these problems have been fixed in
version 1.4.4-2+lenny1.

For the oldstable distribution (etch), these problems have been fixed
in version 1.2-5.

For the testing distribution (squeeze) and the unstable distribution
(sid), these problems have been fixed in version 1.4.7-4.

We recommend that you upgrade your wesnoth packages.

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.39 Low

EPSS

Percentile

96.7%