lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1G7ie1-0004HJ-1X@mercury.mandriva.com>
Date: Mon, 31 Jul 2006 19:02:00 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2006:135 ] - Updated freeciv packages fix DoS vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:135
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : freeciv
 Date    : July 31, 2006
 Affected: 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul
 2006 and earlier, allows remote attackers to cause a denial of service
 (crash) and possibly execute arbitrary code via a (1) negative
 chunk_length or a (2) large chunk->offset value in a
 PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the
 generic_handle_player_attribute_chunk function in common/packets.c, and
 (3) a large packet->length value in the handle_unit_orders function in 
 server/unithand.c.
 
 The updated packages have been patched to fix this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3913
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 5ddab58ab94283b8c4398875a2a845de  2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.i586.rpm
 218f597230b3435da9a41a6cc1f27826  2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.i586.rpm
 ee661fb04809a50f893342ac350dfc3f  2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.i586.rpm
 73be75ec52570bc9a58eed1f94916135  2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 5c0a814a9abb1d374837141815fccb7a  x86_64/2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.x86_64.rpm
 454360b2ce12207760c7e4325c8e5c3f  x86_64/2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.x86_64.rpm
 dea806eb51d3c13f893a3adcd9866f85  x86_64/2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.x86_64.rpm
 73be75ec52570bc9a58eed1f94916135  x86_64/2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEznysmqjQ0CJFipgRAjD2AKC20vpTIzWQxLfI4767y0nj3kX7wACgtcmX
FQ9c69ztrNPZxtCiNA6Z6hg=
=H1PR
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ