what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2006.135

Mandriva Linux Security Advisory 2006.135
Posted Aug 17, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-135 - A buffer overflow exists in Freeciv versions 2.1.0-beta1 and below that may allow for a denial of service and arbitrary code execution.

tags | advisory, denial of service, overflow, arbitrary, code execution
systems | linux, mandriva
advisories | CVE-2006-3913
SHA-256 | 244983117c61a98882c24d525cda6d380bc07661d036a8c9d4631d5073fdb64a

Mandriva Linux Security Advisory 2006.135

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:135
http://www.mandriva.com/security/
_______________________________________________________________________

Package : freeciv
Date : July 31, 2006
Affected: 2006.0
_______________________________________________________________________

Problem Description:

Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul
2006 and earlier, allows remote attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a (1) negative
chunk_length or a (2) large chunk->offset value in a
PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the
generic_handle_player_attribute_chunk function in common/packets.c, and
(3) a large packet->length value in the handle_unit_orders function in
server/unithand.c.

The updated packages have been patched to fix this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3913
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
5ddab58ab94283b8c4398875a2a845de 2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.i586.rpm
218f597230b3435da9a41a6cc1f27826 2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.i586.rpm
ee661fb04809a50f893342ac350dfc3f 2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.i586.rpm
73be75ec52570bc9a58eed1f94916135 2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
5c0a814a9abb1d374837141815fccb7a x86_64/2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.x86_64.rpm
454360b2ce12207760c7e4325c8e5c3f x86_64/2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.x86_64.rpm
dea806eb51d3c13f893a3adcd9866f85 x86_64/2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.x86_64.rpm
73be75ec52570bc9a58eed1f94916135 x86_64/2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEznysmqjQ0CJFipgRAjD2AKC20vpTIzWQxLfI4767y0nj3kX7wACgtcmX
FQ9c69ztrNPZxtCiNA6Z6hg=
=H1PR
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close