Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in freeciv
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in freeciv
ID: MDKSA-2006:135
Distribution: Mandriva
Plattformen: Mandriva 2006.0
Datum: Di, 1. August 2006, 03:54
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3913
Applikationen: FreeCiv

Originalnachricht

This is a multi-part message in MIME format...

------------=_1154397237-9299-671


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:135
http://www.mandriva.com/security/
_______________________________________________________________________

Package : freeciv
Date : July 31, 2006
Affected: 2006.0
_______________________________________________________________________

Problem Description:

Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul
2006 and earlier, allows remote attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a (1) negative
chunk_length or a (2) large chunk->offset value in a
PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the
generic_handle_player_attribute_chunk function in common/packets.c, and
(3) a large packet->length value in the handle_unit_orders function in
server/unithand.c.

The updated packages have been patched to fix this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3913
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
5ddab58ab94283b8c4398875a2a845de
2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.i586.rpm
218f597230b3435da9a41a6cc1f27826
2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.i586.rpm
ee661fb04809a50f893342ac350dfc3f
2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.i586.rpm
73be75ec52570bc9a58eed1f94916135
2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
5c0a814a9abb1d374837141815fccb7a
x86_64/2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.x86_64.rpm
454360b2ce12207760c7e4325c8e5c3f
x86_64/2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.x86_64.rpm
dea806eb51d3c13f893a3adcd9866f85
x86_64/2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.x86_64.rpm
73be75ec52570bc9a58eed1f94916135
x86_64/2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEznysmqjQ0CJFipgRAjD2AKC20vpTIzWQxLfI4767y0nj3kX7wACgtcmX
FQ9c69ztrNPZxtCiNA6Z6hg=
=H1PR
-----END PGP SIGNATURE-----


------------=_1154397237-9299-671
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1154397237-9299-671--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung