blob: 85d8ceae8a89e55fb622384603cb5cf05b8b9762 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200702-09">
<title>Nexuiz: Multiple vulnerabilities</title>
Two separate vulnerabilities have been found in Nexuiz allowing the remote
execution of arbitrary code and a Denial of Service.
<product type="ebuild">nexuiz</product>
<announced>February 25, 2007</announced>
<revised>February 25, 2007: 01</revised>
<package name="games-fps/nexuiz" auto="yes" arch="*">
<unaffected range="ge">2.2.1</unaffected>
<vulnerable range="lt">2.2.1</vulnerable>
Nexuiz is a multi-player FPS game which uses a modified version of the
Quake 1 engine.
Nexuiz fails to correctly validate input within "clientcommands". There
is also a failure to correctly handle connection attempts from remote
<impact type="normal">
Using a specially crafted "clientcommand" a remote attacker can cause a
buffer overflow in Nexuiz which could result in the execution of
arbitrary code. Additionally, there is a Denial of Service
vulnerability in Nexuiz allowing an attacker to cause Nexuiz to crash
or to run out of resources by overloading it with specially crafted
connection requests.
There is no known workaround at this time.
All Nexuiz users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=games-fps/nexuiz-2.2.1&quot;</code>
<uri link="">CVE-2006-6609</uri>
<uri link="">CVE-2006-6610</uri>
<metadata tag="requester" timestamp="Sat, 10 Feb 2007 22:20:41 +0000">
<metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:08 +0000">
<metadata tag="submitter" timestamp="Thu, 15 Feb 2007 16:20:20 +0000">