Bugtraq mailing list archives
[ GLSA 200702-10 ] UFO2000: Multiple vulnerabilities
From: Raphael Marichez <falco () gentoo org>
Date: Sun, 25 Feb 2007 17:11:43 +0100
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200702-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: UFO2000: Multiple vulnerabilities
Date: February 25, 2007
Bugs: #142392
ID: 200702-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in the network components of
UFO2000 that could result in the remote execution of arbitrary code.
Background
==========
UFO2000 is a multi-player, turn-based tactical simulation.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 games-strategy/ufo2000 < 0.7.1062 >= 0.7.1062
Description
===========
Five vulnerabilities were found: a buffer overflow in recv_add_unit();
a problem with improperly trusting user-supplied string information in
decode_stringmap(); several issues with array manipulation via various
commands during play; an SQL injection in server_protocol.cpp; and
finally, a second buffer overflow in recv_map_data().
Impact
======
An attacker could send crafted network traffic as part of a
multi-player game that could result in remote code execution on the
remote opponent or the server. A remote attacker could also run
arbitrary SQL queries against the server account database, and perform
a Denial of Service on a remote opponent by causing the game to crash.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
UFO2000 currently depends on the dumb-0.9.2 library, which has been
removed from portage due to security problems (GLSA 200608-14) .
Because of this, UFO2000 has been masked, and we recommend unmerging
the package until the next beta release can remove the dependency on
dumb.
# emerge --ask --verbose --unmerge ufo2000
References
==========
[ 1 ] CVE-2006-3788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3788
[ 2 ] CVE-2006-3789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3789
[ 3 ] CVE-2006-3790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3790
[ 4 ] CVE-2006-3791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3791
[ 5 ] CVE-2006-3792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3792
[ 6 ] GLSA 200608-14
http://www.gentoo.org/security/en/glsa/glsa-200608-14.xml
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200702-10.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Attachment:
_bin
Description:
Current thread:
- [ GLSA 200702-10 ] UFO2000: Multiple vulnerabilities Raphael Marichez (Feb 26)
