[crossfire] Fwd: [gentoo-announce] [ GLSA 200604-11 ] Crossfire
Tchize
tchize at myrealbox.com
Thu Apr 27 02:56:41 CDT 2006
Hi,
just a matter of information, crossfire has lots of places potentially
allowing execution of arbitrary code using unchecked length string.
Fortunately, those are for most not exploitable as they are not a direct
consequence of client data. However, this does not mean they must not be
fixed. As a developper of crossfire my position is: crossfire has lots
of potential security issues and should always be run in a chrooted
environment to limit the risks to crossfire account.
Regards,
David Delbecq
Andrew Fuchs a écrit :
>Umm, was this the flaw i discovered, or is it a new one?
>
>---------- Forwarded message ----------
>From: Thierry Carrez <koon at gentoo.org>
>Date: Apr 22, 2006 4:12 PM
>Subject: [gentoo-announce] [ GLSA 200604-11 ] Crossfire server: Denial
>of Service and potential arbitrary code execution
>To: gentoo-announce at lists.gentoo.org
>Cc: bugtraq at securityfocus.com, full-disclosure at lists.grok.org.uk,
>security-alerts at linuxsecurity.com
>
>
>- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
>Gentoo Linux Security Advisory GLSA 200604-11
>- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
> http://security.gentoo.org/
>- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
>
> Severity: High
> Title: Crossfire server: Denial of Service and potential arbitrary
> code execution
> Date: April 22, 2006
> Bugs: #126169
> ID: 200604-11
>
>- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
>
>Synopsis
>========
>
>The Crossfire game server is vulnerable to a Denial of Service and
>potentially to the execution of arbitrary code.
>
>Background
>==========
>
>Crossfire is a cooperative multiplayer graphical adventure and
>role-playing game. The Crossfire game server allows various compatible
>clients to connect to participate in a cooperative game.
>
>Affected packages
>=================
>
> -------------------------------------------------------------------
> Package / Vulnerable / Unaffected
> -------------------------------------------------------------------
> 1 games-server/crossfire-server < 1.9.0 >= 1.9.0
>
>Description
>===========
>
>Luigi Auriemma discovered a vulnerability in the Crossfire game server,
>in the handling of the "oldsocketmode" option when processing overly
>large requests.
>
>Impact
>======
>
>An attacker can set up a malicious Crossfire client that would send a
>large request in "oldsocketmode", resulting in a Denial of Service on
>the Crossfire server and potentially in the execution of arbitrary code
>on the server with the rights of the game server.
>
>Workaround
>==========
>
>There is no known workaround at this time.
>
>Resolution
>==========
>
>All Crossfire server users should upgrade to the latest version:
>
> # emerge --sync
> # emerge --ask --oneshot --verbose
>">=games-server/crossfire-server-1.9.0"
>
>References
>==========
>
> [ 1 ] CVE-2006-1010
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1010
>
>Availability
>============
>
>This GLSA and any updates to it are available for viewing at
>the Gentoo Security Website:
>
> http://security.gentoo.org/glsa/glsa-200604-11.xml
>
>Concerns?
>=========
>
>Security is a primary focus of Gentoo Linux and ensuring the
>confidentiality and security of our users machines is of utmost
>importance to us. Any security concerns should be addressed to
>security at gentoo.org or alternatively, you may file a bug at
>http://bugs.gentoo.org.
>
>License
>=======
>
>Copyright 2006 Gentoo Foundation, Inc; referenced text
>belongs to its owner(s).
>
>The contents of this document are licensed under the
>Creative Commons - Attribution / Share Alike license.
>
>http://creativecommons.org/licenses/by-sa/2.0
>
>
>------------------------------------------------------------------------
>
>_______________________________________________
>crossfire mailing list
>crossfire at metalforge.org
>http://mailman.metalforge.org/mailman/listinfo/crossfire
>
>
More information about the crossfire
mailing list