Vulnerabilities > CVE-2006-3849 - Buffer Overflow vulnerability in Pumpkin Studios Warzone and Warzone Resurrection
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Stack-based buffer overflow in Warzone 2100 and Warzone Resurrection 2.0.3 and earlier allows remote attackers to execute arbitrary code via a (1) long message handled by the recvTextMessage function in multiplay.c or a (2) long filename handled by NETrecvFile function in netplay/netplay.c.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200608-16.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200608-16 (Warzone 2100 Resurrection: Multiple buffer overflows) Luigi Auriemma discovered two buffer overflow vulnerabilities in Warzone 2100 Resurrection. The recvTextMessage function of the Warzone 2100 Resurrection server and the NETrecvFile function of the client use insufficiently sized buffers. Impact : A remote attacker could exploit these vulnerabilities by sending specially crafted input to the server, or enticing a user to load a specially crafted file from a malicious server. This may result in the execution of arbitrary code with the permissions of the user running Warzone 2100 Resurrection. Workaround : There is no known workaround for this issue. There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22215 |
published | 2006-08-14 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22215 |
title | GLSA-200608-16 : Warzone 2100 Resurrection: Multiple buffer overflows |
References
- http://aluigi.altervista.org/adv/warzonebof-adv.txt
- http://secunia.com/advisories/21474
- http://securityreason.com/securityalert/1283
- http://www.gentoo.org/security/en/glsa/glsa-200608-16.xml
- http://www.securityfocus.com/archive/1/441039/100/0/threaded
- http://www.securityfocus.com/bid/19118
- http://www.vupen.com/english/advisories/2006/2943
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27910
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27915