Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA334] DSA-334-1 xgalaga


Vulnerability Assessment Details

[DSA334] DSA-334-1 xgalaga

Vulnerability Assessment Summary
DSA-334-1 xgalaga

Detailed Explanation for this Vulnerability Assessment

Steve Kemp discovered several buffer overflows in xgalaga, a game,
which can be triggered by a long HOME environment variable. This
vulnerability could be exploited by a local attacker to gain gid
'games'.
For the stable distribution (woody) this problem has been fixed in
version 2.0.34-19woody1.
For the unstable distribution (sid) this problem is fixed in version
2.0.34-22.
We recommend that you update your xgalaga package.


Solution : http://www.debian.org/security/2003/dsa-334
Network Security Threat Level: High

Networks Security ID: 8058

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

For Kingston 1GB PC1-2700 DDR1-333MHz PC Laptop Memory Notebook SODIMM RAM
$0.99
For Kingston 1GB PC1-2700 DDR1-333MHz PC Laptop Memory Notebook SODIMM RAM pictureDUOMEIQI 4GB DDR2 4 GB 2X 2GB PC2-4200U 533MHz 240PIN DIMM Desktop Memory RAM
$2.99
DUOMEIQI 4GB DDR2 4 GB 2X 2GB PC2-4200U 533MHz 240PIN DIMM Desktop Memory RAM  pictureLot of 10 Hynix 8GB 2Rx4 PC2-5300F-555-11 HMP31G7AFR4C-Y5D5 AB Server Memory
$35.99
Lot of 10 Hynix 8GB 2Rx4 PC2-5300F-555-11 HMP31G7AFR4C-Y5D5 AB Server Memory picturePatriot 64GB USB 2.0 Flash Drive USB Memory New in Package Ship From USA
$22.95
Patriot  64GB USB 2.0 Flash Drive USB Memory New in Package Ship From USA picture


Discussions

No Discussions have been posted on this vulnerability.