Debian Security Advisory DSA 205-1 (gtetrinet)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to gtetrinet announced via advisory DSA 205-1.
Insight
Insight
Steve Kemp and James Antill found several buffer overflows in the gtetrinet (a multiplayer tetris-like game) package as shipped in Debian GNU/Linux 3.0, which could be abused by a malicious server. This has been fixed in upstream version 0.4.4 and release 0.4.1-9woody1.1 of the Debian package.
Solution
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20205-1
Common Vulnerabilities and Exposures (CVE)
Get started for free to scan for vulnerabilities
Companies of all sizes use Mageni to scan their assets for vulnerabilities. Mageni is free for 7-days then $39 USD Monthly regardless of how many IPs, scans, deployments or users you have. Cancel at Anytime and 7-days Money-Back Guarantee. Developed and supported by certified CompTIA PenTest+ professionals. Mageni contributes 1% of your subscription to removing CO₂ from the atmosphere.
Get Started For Free