Linux Security
    Linux Security
    Linux Security

    Debian: lbreakout2 Environment non-sanitation vulnerability

    Posted By
    This bug could be exploited by a local attacker to gain the privileges of group "games".
    Debian Security Advisory DSA 445-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    February 21st, 2004            
    - --------------------------------------------------------------------------
    Package        : lbreakout2
    Vulnerability  : buffer overflow
    Problem-Type   : local
    Debian-specific: no
    CVE Ids        : CAN-2004-0158
    During an audit, Ulf Harnhammar discovered a vulnerability in
    lbreakout2, a game, where proper bounds checking was not performed on
    environment variables.  This bug could be exploited by a local
    attacker to gain the privileges of group "games".
    For the current stable distribution (woody) this problem has been
    fixed in version 2.2.2-1woody1.
    For the unstable distribution (sid), this problem will be fixed soon.
    We recommend that you update your lbreakout2 package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      638 c2e605263d4d0ca08218e667d1299efa
          Size/MD5 checksum:     5688 692094c7a0705bfd5f5595a6ce750977
          Size/MD5 checksum:  1215427 d5f0ef9371d7165723aa35a3e325a3ba
      Alpha architecture:
          Size/MD5 checksum:  1157816 7ef7a54e5b3803ca672b57731cb95f9a
      ARM architecture:
          Size/MD5 checksum:  1126502 28bb2c780e0907c9d7f9862f459002f8
      Intel IA-32 architecture:
          Size/MD5 checksum:  1112732 80fb5d46320ff2b8fae374a61b8ae5ba
      Intel IA-64 architecture:
          Size/MD5 checksum:  1182786 a899fab79519604d591c4a330783db64
      HP Precision architecture:
          Size/MD5 checksum:  1136182 fa206bfef247e4a2feb48234f160bf49
      Motorola 680x0 architecture:
          Size/MD5 checksum:  1110628 9bf1761c57b1fe866e32837cbcf99e71
      Big endian MIPS architecture:
          Size/MD5 checksum:  1142782 d9d2dd4237685a9eec94e7c310e172db
      PowerPC architecture:
          Size/MD5 checksum:  1129844 f7bd1188ba6485798eb22e195ee938dd
      IBM S/390 architecture:
          Size/MD5 checksum:  1121760 5c49bbbfd9f582151bf3cb8b8a2e213a
      Sun Sparc architecture:
          Size/MD5 checksum:  1124704 95231dbcc444a3f2e65603029e1f5e2c
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and
    Version: GnuPG v1.2.4 (GNU/Linux)


    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"125","title":"Yes","votes":"45","type":"x","order":"1","pct":83.33,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":16.67,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.