Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2023.0150
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2023-0150)
Resumen:The remote host is missing an update for the 'squirrel, supertux' package(s) announced via the MGASA-2023-0150 advisory.
Descripción:Summary:
The remote host is missing an update for the 'squirrel, supertux' package(s) announced via the MGASA-2023-0150 advisory.

Vulnerability Insight:
sqclass.cpp in Squirrel 3.1 allows an out-of-bounds read (in the core
interpreter) that can lead to Code Execution. If a victim executes an
attacker-controlled squirrel script, it is possible for the attacker to
break out of the squirrel script sandbox even if all dangerous
functionality such as File System functions has been disabled. An
attacker might abuse this bug to target (for example) Cloud services
that allow customization via SquirrelScripts, or distribute malware
through video games that embed a Squirrel Engine. (CVE-2021-41556)

supertux has been rebuilt as it uses a bundled copy of squirrel.

Affected Software/OS:
'squirrel, supertux' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-41556
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3FQILX7UUEERSDPMZP3MKGTMY2E7ESU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BV7SJJ44AGAX4ILIVPREIXPJ2GOG3FKV/
http://www.squirrel-lang.org/#download
https://blog.sonarsource.com/squirrel-vm-sandbox-escape/
https://github.com/albertodemichelis/squirrel/commit/23a0620658714b996d20da3d4dd1a0dcf9b0bd98
CopyrightCopyright (C) 2023 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.