Linux Security
    Linux Security
    Linux Security

    Debian: 'xpilot' Remote buffer overflow vulnerability

    Date 17 Apr 2002
    Posted By LinuxSecurity Advisories
    This overflow can be abused by remote attackers to gain access tothe server under which the xpilot server is running.
    Debian Security Advisory DSA-127-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. Wichert Akkerman
    April 17, 2002
    Package        : xpilot
    Problem type   : remote buffer overflow
    Debian-specific: no
    An internal audit by the xpilot (a multi-player tactical manoeuvring
    game for X) maintainers revealed a buffer overflow in xpilot server.
    This overflow can be abused by remote attackers to gain access to
    the server under which the xpilot server is running.
    This has been fixed in upstream version 4.5.1 and version
    4.1.0-4.U.4alpha2.4.potato1 of the Debian package.
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    Debian GNU/Linux 2.2 alias potato
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
      At this moment arm packages are not available yet.
      Source archives:
    MD5 checksum: 6c7aa5e06237d0848cc05c3f121d43f3
    MD5 checksum: 51c30a3a226f52e0f99ed5d656e42f37
    MD5 checksum: 049f4e51d8f033911d3ce055b3b6b701
      Architecture independent archives:
    MD5 checksum: 05c17a8211111e576b8886d6dfd4e737
      Alpha architecture:
    MD5 checksum: f506b1c9866c9585900351c10955dd43
    MD5 checksum: c45fd37746a572ca4d778a2f6e52dbc5
    MD5 checksum: 3950b11932d57fb3ae72d1d5621d7f05
    MD5 checksum: a66b89463d42a6975df899fa130470f8
      Intel IA-32 architecture:
    MD5 checksum: f0d1306de990f6160ba5cc3e1580b2b2
    MD5 checksum: 28b1c0e638e142f93eb2af7ca71f80d5
    MD5 checksum: 4bb509a8a5711bc570c9e2645b926a35
    MD5 checksum: b2c7cf184d6ff9b9b52e7e5a324ff3d7
      Motorola 680x0 architecture:
    MD5 checksum: dbac533733306578fdc22c585c1e55e6
    MD5 checksum: d8d9414db73b3088330755a7d561ac5d
    MD5 checksum: 84ec746bc1c1e816448e10868981794d
    MD5 checksum: ae66ef2a10d456761541c135bf88fb16
      PowerPC architecture:
    MD5 checksum: 49cc8ed07762238a86369190e76dad69
    MD5 checksum: cb0ec5bcf0895efb66f403cafa55d65b
    MD5 checksum: 98b99485dddf88297de54d3cf9af57b0
    MD5 checksum: 256bb2bdfad21832a159570239900da5
      Sun Sparc architecture:
    MD5 checksum: c496e49126d1e2b6991ffbd1c131f5c9
    MD5 checksum: 507b9fbda3656835a068f86594aaf8bb
    MD5 checksum: d47eb85feb092c653e367fcd348600b1
    MD5 checksum: 8658a59cc18ba83ba84304df0ecbbfec
      These packages will be moved into the stable distribution on its next
    apt-get: deb stable/updates main
    dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.