Well I took a deeper look at the vulnerability.
It is indeed injectable. But there is a simple WAF aka filtering going on. Its just the select keyword "from" that gets filtered and /etc/passwd as I noticed but nothing else so far.
Conclusion: You cannot bypass the keyword "from" and you don't have file privileges. You can extract the information about the player table with the given Select statement but beside that there is no exploitation by sqli possible on this parameter.
Apache is 1.3.41 though ...
cheers