Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2023.0150
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2023-0150)
Summary:The remote host is missing an update for the 'squirrel, supertux' package(s) announced via the MGASA-2023-0150 advisory.
Description:Summary:
The remote host is missing an update for the 'squirrel, supertux' package(s) announced via the MGASA-2023-0150 advisory.

Vulnerability Insight:
sqclass.cpp in Squirrel 3.1 allows an out-of-bounds read (in the core
interpreter) that can lead to Code Execution. If a victim executes an
attacker-controlled squirrel script, it is possible for the attacker to
break out of the squirrel script sandbox even if all dangerous
functionality such as File System functions has been disabled. An
attacker might abuse this bug to target (for example) Cloud services
that allow customization via SquirrelScripts, or distribute malware
through video games that embed a Squirrel Engine. (CVE-2021-41556)

supertux has been rebuilt as it uses a bundled copy of squirrel.

Affected Software/OS:
'squirrel, supertux' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-41556
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3FQILX7UUEERSDPMZP3MKGTMY2E7ESU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BV7SJJ44AGAX4ILIVPREIXPJ2GOG3FKV/
http://www.squirrel-lang.org/#download
https://blog.sonarsource.com/squirrel-vm-sandbox-escape/
https://github.com/albertodemichelis/squirrel/commit/23a0620658714b996d20da3d4dd1a0dcf9b0bd98
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.