The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[ MDKSA-2006:135 ] - Updated freeciv packages fix DoS vulnerabilities


<< Previous INDEX Search src / Print Next >>
To: bugtraq@securityfocus.com
Subject: [ MDKSA-2006:135 ] - Updated freeciv packages fix DoS vulnerabilities
Date: Mon, 31 Jul 2006 19:02:00 -0600
From: security@mandriva.com
Reply-To: <xsecurity@mandriva.com.>
Message-Id: <E1G7ie1-0004HJ-1X@mercury.mandriva.com.>
Sender: QATeam User <qateam@mercury.mandriva.com.>
X-Virus-Scanned: antivirus-gw at tyumen.ru


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:135
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : freeciv
 Date    : July 31, 2006
 Affected: 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul
 2006 and earlier, allows remote attackers to cause a denial of service
 (crash) and possibly execute arbitrary code via a (1) negative
 chunk_length or a (2) large chunk->offset value in a
 PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the
 generic_handle_player_attribute_chunk function in common/packets.c, and
 (3) a large packet->length value in the handle_unit_orders function in 
 server/unithand.c.
 
 The updated packages have been patched to fix this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3913
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 5ddab58ab94283b8c4398875a2a845de  2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.i586.rpm
 218f597230b3435da9a41a6cc1f27826  2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.i586.rpm
 ee661fb04809a50f893342ac350dfc3f  2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.i586.rpm
 73be75ec52570bc9a58eed1f94916135  2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 5c0a814a9abb1d374837141815fccb7a  x86_64/2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.x86_64.rpm
 454360b2ce12207760c7e4325c8e5c3f  x86_64/2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.x86_64.rpm
 dea806eb51d3c13f893a3adcd9866f85  x86_64/2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.x86_64.rpm
 73be75ec52570bc9a58eed1f94916135  x86_64/2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEznysmqjQ0CJFipgRAjD2AKC20vpTIzWQxLfI4767y0nj3kX7wACgtcmX
FQ9c69ztrNPZxtCiNA6Z6hg=
=H1PR
-----END PGP SIGNATURE-----



<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру