Vulnerabilities > CVE-2006-3849 - Buffer Overflow vulnerability in Pumpkin Studios Warzone and Warzone Resurrection

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
pumpkin-studios
nessus

Summary

Stack-based buffer overflow in Warzone 2100 and Warzone Resurrection 2.0.3 and earlier allows remote attackers to execute arbitrary code via a (1) long message handled by the recvTextMessage function in multiplay.c or a (2) long filename handled by NETrecvFile function in netplay/netplay.c.

Vulnerable Configurations

Part Description Count
Application
Pumpkin_Studios
2

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200608-16.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200608-16 (Warzone 2100 Resurrection: Multiple buffer overflows) Luigi Auriemma discovered two buffer overflow vulnerabilities in Warzone 2100 Resurrection. The recvTextMessage function of the Warzone 2100 Resurrection server and the NETrecvFile function of the client use insufficiently sized buffers. Impact : A remote attacker could exploit these vulnerabilities by sending specially crafted input to the server, or enticing a user to load a specially crafted file from a malicious server. This may result in the execution of arbitrary code with the permissions of the user running Warzone 2100 Resurrection. Workaround : There is no known workaround for this issue. There is no known workaround at this time.
last seen2020-06-01
modified2020-06-02
plugin id22215
published2006-08-14
reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/22215
titleGLSA-200608-16 : Warzone 2100 Resurrection: Multiple buffer overflows