Summary
The remote host is missing an update to wesnoth
announced via advisory DSA 1737-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201737-1
Insight
Several security issues have been discovered in wesnoth, a fantasy turn-based strategy game. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2009-0366
Daniel Franke discovered that the wesnoth server is prone to a denial of service attack when receiving special crafted compressed data.
CVE-2009-0367
Daniel Franke discovered that the sandbox implementation for the python AIs can be used to execute arbitrary python code on wesnoth clients. In order to prevent this issue, the python support has been disabled. A compatibility patch was included, so that the affected campagne is still working properly.
For the stable distribution (lenny), these problems have been fixed in version 1.4.4-2+lenny1.
For the oldstable distribution (etch), these problems have been fixed in version 1.2-5.
For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 1.4.7-4.
We recommend that you upgrade your wesnoth packages.
Severity
Classification
-
CVE CVE-2009-0366, CVE-2009-0367 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities