|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: torcs|
|Summary:||FreeBSD Ports: torcs|
The remote host is missing an update to the system
as announced in the referenced advisory.
The following packages are affected:
Buffer overflow in the ulSetError function in util/ulError.cxx in PLIB
1.8.5, as used in TORCS 1.3.1 and other products, allows user-assisted
remote attackers to execute arbitrary code via vectors involving a
long error message, as demonstrated by a crafted acc file for TORCS.
NOTE: some of these details are obtained from third party information.
Update your system with the appropriate patches or
Common Vulnerability Exposure (CVE) ID: CVE-2011-4620|
SuSE Security Announcement: openSUSE-SU-2012:1506 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:0146 (Google Search)
|Copyright||Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com|
|This is only one of 56160 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.