Executive Summary
Summary | |
---|---|
Title | New wesnoth packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-1737 | First vendor Publication | 2009-03-11 |
Vendor | Debian | Last vendor Modification | 2009-03-11 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several security issues have been discovered in wesnoth, a fantasy turn-based strategy game. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-0366 Daniel Franke discovered that the wesnoth server is prone to a denial of service attack when receiving special crafted compressed data. CVE-2009-0367 Daniel Franke discovered that the sandbox implementation for the python AIs can be used to execute arbitrary python code on wesnoth clients. In order to prevent this issue, the python support has been disabled. A compatibility patch was included, so that the affected campagne is still working properly. For the stable distribution (lenny), these problems have been fixed in version 1.4.4-2+lenny1. For the oldstable distribution (etch), these problems have been fixed in version 1.2-5. For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 1.4.7-4. We recommend that you upgrade your wesnoth packages. |
Original Source
Url : http://www.debian.org/security/2009/dsa-1737 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-399 | Resource Management Errors |
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-03-13 | Name : Debian Security Advisory DSA 1737-1 (wesnoth) File : nvt/deb_1737_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
53877 | Wesnoth Python AI Module Hierarchical Module Name Handling Arbitrary Code Exe... |
52672 | Wesnoth simple_wml.cpp uncompress_buffer() Function WML File Handling DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-03-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1737.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:28:15 |
|