Gentoo Logo

Nexuiz: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200702-09 / nexuiz
Release Date February 25, 2007
Latest Revision February 25, 2007: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
games-fps/nexuiz < 2.2.1 >= 2.2.1 All supported architectures

Related bugreports: #166044


Two separate vulnerabilities have been found in Nexuiz allowing the remote execution of arbitrary code and a Denial of Service.

2.  Impact Information


Nexuiz is a multi-player FPS game which uses a modified version of the Quake 1 engine.


Nexuiz fails to correctly validate input within "clientcommands". There is also a failure to correctly handle connection attempts from remote hosts.


Using a specially crafted "clientcommand" a remote attacker can cause a buffer overflow in Nexuiz which could result in the execution of arbitrary code. Additionally, there is a Denial of Service vulnerability in Nexuiz allowing an attacker to cause Nexuiz to crash or to run out of resources by overloading it with specially crafted connection requests.

3.  Resolution Information


There is no known workaround at this time.


All Nexuiz users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=games-fps/nexuiz-2.2.1"

4.  References


Page updated February 25, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.