Debian: xboing Buffer overflow vulnerabilities

    Date 27 Feb 2004
    Posted By LinuxSecurity Advisories
    can be exploited by a local attacker to gain gid "games".
    Debian Security Advisory DSA 451-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    February 27th, 2004            
    - --------------------------------------------------------------------------
    Package        : xboing
    Vulnerability  : buffer overflows
    Problem-Type   : local
    Debian-specific: no
    CVE Id         : CAN-2004-0149
    Debian bug     : 174924
    Steve Kemp discovered a number of buffer overflow vulnerabilities in
    xboing, a game, which could be exploited by a local attacker to gain
    gid "games".
    For the current stable distribution (woody) these problems have been
    fixed in version 2.4-26woody1.
    For the unstable distribution (sid), these problems have been fixed in
    version 2.4-26.1.
    We recommend that you update your xboing package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      580 f9ef94d37b5db34cf867d172529ad325
          Size/MD5 checksum:    13200 3627d000f33d496e5092bef84c92963e
          Size/MD5 checksum:   586869 3b6ebbf4321cffc69048e5611aa9d28d
      Alpha architecture:
          Size/MD5 checksum:   533078 77530ad6b6abdb480af6a7d5ba03d609
      ARM architecture:
          Size/MD5 checksum:   520166 de88300d9d4d6232b0e04d8dc700d5f1
      Intel IA-32 architecture:
          Size/MD5 checksum:   510744 21f12476ececfab492a3525162e465bf
      Intel IA-64 architecture:
          Size/MD5 checksum:   575066 d59a129a157f2c7f0d6b155d5c219c24
      HP Precision architecture:
          Size/MD5 checksum:   516918 ef35a77de22e3785953b4824ae0f1324
      Motorola 680x0 architecture:
          Size/MD5 checksum:   509124 065f733083fac4310355ed1d212b386d
      Big endian MIPS architecture:
          Size/MD5 checksum:   525836 b0af1feb5d8ced400a5e783f0abcfcd9
      Little endian MIPS architecture:
          Size/MD5 checksum:   523436 34f791984ef83ac3237c40a3a615e3a0
      PowerPC architecture:
          Size/MD5 checksum:   512960 09be35d56f9707f45cda7971c1996b58
      IBM S/390 architecture:
          Size/MD5 checksum:   515484 2d00881d1d4204fef37e9a650bf96b90
      Sun Sparc architecture:
          Size/MD5 checksum:   515784 517ce299d41930a7ed18ac2b48f178a1
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"125","title":"Yes","votes":"36","type":"x","order":"1","pct":80,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":20,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.