BSD-Games Multiple Local Buffer Overflow Vulnerabilities
BID:17401
Info
BSD-Games Multiple Local Buffer Overflow Vulnerabilities
| Bugtraq ID: | 17401 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2006-1744 |
| Remote: | No |
| Local: | Yes |
| Published: | Apr 06 2006 12:00AM |
| Updated: | Dec 07 2006 03:29AM |
| Credit: | Discovery is credited to Anibal L. Sacco <[email protected]>. |
| Vulnerable: |
Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 Debian Linux 3.0 sparc Debian Linux 3.0 s/390 Debian Linux 3.0 ppc Debian Linux 3.0 mipsel Debian Linux 3.0 mips Debian Linux 3.0 m68k Debian Linux 3.0 ia-64 Debian Linux 3.0 ia-32 Debian Linux 3.0 hppa Debian Linux 3.0 arm Debian Linux 3.0 alpha Debian Linux 3.0 bsd-games bsd-games 2.14 bsd-games bsd-games 2.13 bsd-games bsd-games 2.12 bsd-games bsd-games 2.9 bsd-games bsd-games 2.17 |
| Not Vulnerable: | |
Discussion
BSD-Games Multiple Local Buffer Overflow Vulnerabilities
Multiple games in the BSD-games package are prone to locally exploitable buffer-overflow vulnerabilities. These issues are due to insufficient bounds-checking when copying user-supplied input to insufficiently sized memory buffers.
Since these games are installed 'setgid games' on many operating systems, attackers may be able to exploit these issues to escalate privileges to this level.
Multiple games in the BSD-games package are prone to locally exploitable buffer-overflow vulnerabilities. These issues are due to insufficient bounds-checking when copying user-supplied input to insufficiently sized memory buffers.
Since these games are installed 'setgid games' on many operating systems, attackers may be able to exploit these issues to escalate privileges to this level.
Exploit / POC
BSD-Games Multiple Local Buffer Overflow Vulnerabilities
Currently we are not aware of any exploits for these issues. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
Currently we are not aware of any exploits for these issues. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
Solution / Fix
BSD-Games Multiple Local Buffer Overflow Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
Please see the references for more information and vendor advisories.
bsd-games bsd-games 2.17
bsd-games bsd-games 2.13
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
Please see the references for more information and vendor advisories.
bsd-games bsd-games 2.17
-
Debian bsdgames_2.17-1sarge1_alpha.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_alpha.deb -
Debian bsdgames_2.17-1sarge1_amd64.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_amd64.deb -
Debian bsdgames_2.17-1sarge1_arm.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_arm.deb -
Debian bsdgames_2.17-1sarge1_hppa.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_hppa.deb -
Debian bsdgames_2.17-1sarge1_i386.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_i386.deb -
Debian bsdgames_2.17-1sarge1_ia64.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_ia64.deb -
Debian bsdgames_2.17-1sarge1_m68k.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_m68k.deb -
Debian bsdgames_2.17-1sarge1_mips.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_mips.deb -
Debian bsdgames_2.17-1sarge1_mipsel.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_mipsel.deb -
Debian bsdgames_2.17-1sarge1_powerpc.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_powerpc.deb -
Debian bsdgames_2.17-1sarge1_s390.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_s390.deb -
Debian bsdgames_2.17-1sarge1_sparc.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_sparc.deb
bsd-games bsd-games 2.13
-
Debian bsdgames_2.13-7woody0_alpha.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_alpha.deb -
Debian bsdgames_2.13-7woody0_arm.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_arm.deb -
Debian bsdgames_2.13-7woody0_hppa.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_hppa.deb -
Debian bsdgames_2.13-7woody0_i386.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_i386.deb -
Debian bsdgames_2.13-7woody0_ia64.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_ia64.deb -
Debian bsdgames_2.13-7woody0_m68k.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_m68k.deb -
Debian bsdgames_2.13-7woody0_mips.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_mips.deb -
Debian bsdgames_2.13-7woody0_mipsel.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_mipsel.deb -
Debian bsdgames_2.13-7woody0_powerpc.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_powerpc.deb -
Debian bsdgames_2.13-7woody0_s390.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_s390.deb -
Debian bsdgames_2.13-7woody0_sparc.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_sparc.deb
References
BSD-Games Multiple Local Buffer Overflow Vulnerabilities
References:
References:
- bsd-games Homepage (bsd-games)
- Debian BSD-games has an overflow (PullThePlug.org)
- Debian Bug report logs - #360989 (Debian)