CVE-2005-3535
CVSS7.5
发布时间 :2005-12-27 18:03:00
修订时间 :2008-09-05 16:54:39
NMCOS    

[原文]Buffer overflow in KETM 0.0.6 allows local users to execute arbitrary code via unknown vectors.


[CNNVD]KETM本地缓冲区溢出漏洞(CNNVD-200512-577)

        KETM(Kill every thing that moves)是一款2D纵向射击游戏。
        KETM中存在本地可利用的缓冲区溢出,可能允许攻击者以组游戏的权限执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3535
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3535
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200512-577
(官方数据源) CNNVD

- 其它链接及资源

http://www.debian.org/security/2005/dsa-926
(VENDOR_ADVISORY)  DEBIAN  DSA-926
http://www.securityfocus.com/bid/16049/
(UNKNOWN)  BID  16049
http://secunia.com/advisories/18225
(UNKNOWN)  SECUNIA  18225

- 漏洞信息

KETM本地缓冲区溢出漏洞
高危 缓冲区溢出
2005-12-27 00:00:00 2005-12-28 00:00:00
本地  
        KETM(Kill every thing that moves)是一款2D纵向射击游戏。
        KETM中存在本地可利用的缓冲区溢出,可能允许攻击者以组游戏的权限执行任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://www.debian.org/security/2005/dsa-926
        http://security.debian.org/pool/updates/main/k/ketm/ketm_0.0.6-7woody0.dsc
        http://security.debian.org/pool/updates/main/k/ketm/ketm_0.0.6-7woody0.diff.gz
        http://ftp.debian.org/debian/pool/main/k/ketm/ketm_0.0.6.orig.tar.gz
        http://security.debian.org/pool/updates/main/k/ketm/ketm_0.0.6-7woody0_alpha.deb
        http://security.debian.org/pool/updates/main/k/ketm/ketm_0.0.6-17sarge1.dsc
        http://security.debian.org/pool/updates/main/k/ketm/ketm_0.0.6-17sarge1.diff.gz
        http://ftp.debian.org/debian/pool/main/k/ketm/ketm_0.0.6.orig.tar.gz
        http://security.debian.org/pool/updates/main/k/ketm/ketm-data_0.0.6-17sarge1_all.deb
        http://security.debian.org/pool/updates/main/k/ketm/ketm_0.0.6-17sarge1_alpha.deb

- 漏洞信息

22065
ketm Local Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-12-23 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

KETM Local Buffer Overflow Vulnerability
Boundary Condition Error 16049
No Yes
2005-12-23 12:00:00 2006-11-30 03:49:00
Discovered by Steve Kemp from the Debian Security Audit Project.

- 受影响的程序版本

KETM KETM 0.0.6
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 amd64
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0

- 漏洞讨论

KETM is vulnerable to a locally exploitable buffer-overflow vulnerability. Reportedly, a local attacker may exploit this condition to execute arbitrary instructions with group games privileges.

Due to a lack of information, further details cannot be provided at the moment. This BID will be updated when more information becomes available.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Please see the referenced advisories for more information.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.commailto:vuldb@securityfocus.com


KETM KETM 0.0.6

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站