Gentoo Logo

Scorched 3D server chat box format string vulnerability


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200404-12 / scorched3d
Release Date April 09, 2004
Latest Revision April 09, 2004: 08
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
games-strategy/scorched3d < 37 >= 37 All supported architectures

Related bugreports: #39302


Scorched 3D is vulnerable to a format string attack in the chat box that leads to Denial of Service on the game server and possibly allows execution of arbitrary code.

2.  Impact Information


Scorched 3D is a game based loosely on the classic DOS game "Scorched Earth". Scorched 3D adds amongst other new features a 3D island environment and LAN and internet play. Scorched 3D is totally free and is available for multiple operating systems.


Scorched 3D (build 36.2 and before) does not properly check the text entered in the Chat box (T key). Using format string characters, you can generate a heap overflow. This and several other unchecked buffers have been corrected in the build 37 release.


This vulnerability can be easily exploited to remotely crash the Scorched 3D server, disconnecting all clients. It could also theorically be used to execute arbitrary code on the server with the rights of the user running the server.

3.  Resolution Information


A workaround is not currently known for this issue. All users are advised to upgrade to the latest version of the affected package.


Scorched 3D users should upgrade to version 37 or later:

Code Listing 3.1: Resolution

# emerge sync
# emerge -pv ">=games-strategy/scorched3d-37"
# emerge ">=games-strategy/scorched3d-37"


Page updated April 09, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.