Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200603-26] bsd-games: Local privilege escalation in tetris-bsd


Vulnerability Assessment Details

[GLSA-200603-26] bsd-games: Local privilege escalation in tetris-bsd

Vulnerability Assessment Summary
bsd-games: Local privilege escalation in tetris-bsd

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200603-26
(bsd-games: Local privilege escalation in tetris-bsd)


Tavis Ormandy of the Gentoo Linux Security Audit Team discovered
that the checkscores() function in scores.c reads in the data from the
/var/games/tetris-bsd.scores file without validation, rendering it
vulnerable to buffer overflows and incompatible with the system used
for managing games on Gentoo Linux. As a result, it cannot be played
securely on systems with multiple users. Please note that this is
probably a Gentoo-specific issue.

Impact

A local user who is a member of group "games" may be able to
modify the tetris-bsd.scores file to trigger the execution of arbitrary
code with the rights of other players.

Workaround

Do not add untrusted users to the "games" group.


Solution:
All bsd-games users are advised to update to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=games-misc/bsd-games-2.17-r1"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors

INTEL SLABS XEON 3.0 GHZ 4MB CACHE 1333 MHZ BUS COSTA RICA CPU PROCESSOR #2
$3.94
INTEL SLABS XEON 3.0 GHZ 4MB CACHE 1333 MHZ BUS COSTA RICA CPU PROCESSOR #2 pictureINTEL SLABS XEON 3.0 GHZ 4MB CACHE 1333 MHZ BUS COSTA RICA CPU PROCESSOR #1
$3.94
INTEL SLABS XEON 3.0 GHZ 4MB CACHE 1333 MHZ BUS COSTA RICA CPU PROCESSOR #1  pictureDell PowerEdge R710 Gen II 3.5" 2x X5550 2.66GHz 4 Core 8GB Ram 6x 2TB SATA
$423.0
Dell PowerEdge R710 Gen II 3.5Noctua CPU Cooler NH-U12DX i4 Xeon CPU LGA2011/1356/1366 platform SSO2 1500rpm R
$130.8
Noctua CPU Cooler NH-U12DX i4 Xeon CPU LGA2011/1356/1366 platform SSO2 1500rpm R picture


Discussions

No Discussions have been posted on this vulnerability.