Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200604-05] Doomsday: Format string vulnerability

Vulnerability Assessment Details

[GLSA-200604-05] Doomsday: Format string vulnerability

Vulnerability Assessment Summary
Doomsday: Format string vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200604-05
(Doomsday: Format string vulnerability)

Luigi Auriemma discovered that Doomsday incorrectly implements
formatted printing.


A remote attacker could exploit these vulnerabilities to execute
arbitrary code with the rights of the user running the Doomsday server
or client by sending specially crafted strings.


There is no known workaround at this time.


Doomsday has been masked in Portage pending the resolution of
these issues. All Doomsday users are advised to uninstall the package
until further notice.
# emerge --ask --verbose --unmerge games-fps/doomsday

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors

3.5" Internal Desktop Computer Hard Drive 7200RPM 64MB Cache 1TB SATA HDD


No Discussions have been posted on this vulnerability.