|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200608-16] Warzone 2100 Resurrection: Multiple buffer overflows Vulnerability Assessment Details
|
[GLSA-200608-16] Warzone 2100 Resurrection: Multiple buffer overflows |
||
Warzone 2100 Resurrection: Multiple buffer overflows Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200608-16 (Warzone 2100 Resurrection: Multiple buffer overflows) Luigi Auriemma discovered two buffer overflow vulnerabilities in Warzone 2100 Resurrection. The recvTextMessage function of the Warzone 2100 Resurrection server and the NETrecvFile function of the client use insufficiently sized buffers. Impact A remote attacker could exploit these vulnerabilities by sending specially crafted input to the server, or enticing a user to load a specially crafted file from a malicious server. This may result in the execution of arbitrary code with the permissions of the user running Warzone 2100 Resurrection. Workaround There is no known workaround for this issue. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3849 Solution: Warzone 2100 Resurrection has been masked in Portage pending the resolution of these issues. Warzone 2100 Resurrection players are advised to uninstall the package until further notice: # emerge --ask --unmerge "games-strategy/warzone2100" Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: (C) 2006 Michel Arboi |
||
Cables, Connectors |
Juniper Networks 740-061405 JNP-QSFP-100G-SR4 OM3 QSFP28 100GE 850nm100m 1PCS
$150.00
Juniper 740-061409 QSFP-100G-LR4 SMF 10km 1310nm 70C 100GBAS SMF Transceiver
$105.00
JUNIPER EX3400-48P 48x 1GB PoE+ RJ-45 4x 10GB SFP+ 2x 40GB QSFP+, DUAL AC POWER
$210.00
Juniper Networks EX3300 EX3300-48P 48-Port Gigabit PoE+ Switch
$40.12
Juniper QFX5100-48T-AFO 48x 10Gb RJ45, 6x QSFP 40GE & Dual AC
$699.00
Juniper EX4600-40F-AFI 24 SFP+/SFP Ports 4 QSFP+ Ports Dual AC Switch
$999.00
Juniper Networks EX4300-48T 48 Port Gigabit 4 QSFP 40G 2xPSU AFO Network Switch
$89.00
Juniper Networks EX3300-24P | 24 Port Gigabit Network Switch w/ Power cord
$53.99
Juniper Networks EX2300-C 12-Port 2XSFP Uplinks PoE+ Switch P/N: EX2300-C-12P
$299.99
New Factory Sealed Juniper EX2300-48P Networks 48-Port Managed Ethernet Sealed
$499.00
|
||
No Discussions have been posted on this vulnerability. |