blob: 106e157a004e9bdd1898d250e463c244fa862b3b [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200606-20">
<title>Typespeed: Remote execution of arbitrary code</title>
A buffer overflow in the network code of Typespeed can lead to the
execution of arbitrary code.
<product type="ebuild">typespeed</product>
<announced>June 19, 2006</announced>
<revised>June 19, 2006: 01</revised>
<package name="games-misc/typespeed" auto="yes" arch="*">
<unaffected range="ge">0.5.0</unaffected>
<vulnerable range="lt">0.5.0</vulnerable>
Typespeed is a game to test and practice 10-finger-typing. Network code
allows two users to compete head-to-head.
Niko Tyni discovered a buffer overflow in the addnewword() function of
Typespeed's network code.
<impact type="high">
By sending specially crafted network packets to a machine running
Typespeed in multiplayer mode, a remote attacker can execute arbitrary
code with the permissions of the user running the game.
Do not run Typespeed in multiplayer mode. There is no known workaround
at this time for multiplayer mode.
All Typespeed users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=games-misc/typespeed-0.5.0&quot;</code>
<uri link="">CVE-2006-1515</uri>
<metadata tag="requester" timestamp="Sun, 11 Jun 2006 22:01:54 +0000">
<metadata tag="submitter" timestamp="Tue, 13 Jun 2006 05:10:07 +0000">
<metadata tag="bugReady" timestamp="Sun, 18 Jun 2006 12:23:54 +0000">