Debian: xboing Buffer overflow vulnerabilities

    Date27 Feb 2004
    CategoryDebian
    2487
    Posted ByLinuxSecurity Advisories
    can be exploited by a local attacker to gain gid "games".
    
    Debian Security Advisory DSA 451-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Matt Zimmerman
    February 27th, 2004                      http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : xboing
    Vulnerability  : buffer overflows
    Problem-Type   : local
    Debian-specific: no
    CVE Id         : CAN-2004-0149
    Debian bug     : 174924
    
    Steve Kemp discovered a number of buffer overflow vulnerabilities in
    xboing, a game, which could be exploited by a local attacker to gain
    gid "games".
    
    For the current stable distribution (woody) these problems have been
    fixed in version 2.4-26woody1.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 2.4-26.1.
    
    We recommend that you update your xboing package.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1.dsc
          Size/MD5 checksum:      580 f9ef94d37b5db34cf867d172529ad325
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1.diff.gz
          Size/MD5 checksum:    13200 3627d000f33d496e5092bef84c92963e
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4.orig.tar.gz
          Size/MD5 checksum:   586869 3b6ebbf4321cffc69048e5611aa9d28d
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_alpha.deb
          Size/MD5 checksum:   533078 77530ad6b6abdb480af6a7d5ba03d609
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_arm.deb
          Size/MD5 checksum:   520166 de88300d9d4d6232b0e04d8dc700d5f1
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_i386.deb
          Size/MD5 checksum:   510744 21f12476ececfab492a3525162e465bf
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_ia64.deb
          Size/MD5 checksum:   575066 d59a129a157f2c7f0d6b155d5c219c24
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_hppa.deb
          Size/MD5 checksum:   516918 ef35a77de22e3785953b4824ae0f1324
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_m68k.deb
          Size/MD5 checksum:   509124 065f733083fac4310355ed1d212b386d
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_mips.deb
          Size/MD5 checksum:   525836 b0af1feb5d8ced400a5e783f0abcfcd9
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_mipsel.deb
          Size/MD5 checksum:   523436 34f791984ef83ac3237c40a3a615e3a0
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_powerpc.deb
          Size/MD5 checksum:   512960 09be35d56f9707f45cda7971c1996b58
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_s390.deb
          Size/MD5 checksum:   515484 2d00881d1d4204fef37e9a650bf96b90
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/x/xboing/xboing_2.4-26woody1_sparc.deb
          Size/MD5 checksum:   515784 517ce299d41930a7ed18ac2b48f178a1
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"4","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":14.29,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.