发布时间 :2006-01-20 16:03:00
修订时间 :2011-03-07 21:29:13

[原文]crawl before 4.0.0 does not securely call programs when saving and loading games, which allows local users to gain privileges.

[CNNVD]Linley Henzell Dungeon Crawl 未指定的命令执行漏洞(CNNVD-200601-258)

        crawl 4.0.0之前的版本在保存和加载游戏时未安全地调用程序,这可让本地用户获取特权。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  VUPEN  ADV-2006-0303
(UNKNOWN)  BID  16337
(UNKNOWN)  XF  crawl-insecure-command-execution(24262)

- 漏洞信息

Linley Henzell Dungeon Crawl 未指定的命令执行漏洞
高危 设计错误
2006-01-20 00:00:00 2006-01-30 00:00:00
        crawl 4.0.0之前的版本在保存和加载游戏时未安全地调用程序,这可让本地用户获取特权。

- 公告与补丁


- 漏洞信息

Linleys Dungeon Crawl Arbitrary Command Execution
Local Access Required Authentication Management
Loss of Integrity
Exploit Unknown

- 漏洞描述

Dungeon Crawl contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered because the program executes programs in an insecure manner when saving or loading games, allowing a local user to gain 'games' group privileges. This flaw may lead to a loss of integrity.

- 时间线

2006-01-20 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds issued by the vendor to correct this issue. Debian users should upgrade using the new packages that have been made available for the 'woody', 'sarge' and 'sid' distributions.

- 相关参考

- 漏洞作者

- 漏洞信息

Linley Henzell Dungeon Crawl Unspecified Command Execution Vulnerability
Design Error 16337
No Yes
2006-01-20 12:00:00 2007-02-20 08:56:00
Steve Kemp discovered this issue.

- 受影响的程序版本

Linley Henzell Crawl 4.0 BETA 26
Linley Henzell Crawl 4.0 BETA 23
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
Linley Henzell Crawl 4.0

- 漏洞讨论

Dungeon Crawl has been reported to be prone to an unspecified command-execution vulnerability.

Local attackers can trigger this vulnerability to execute arbitrary commands to gain group games privileges.

- 漏洞利用

An exploit is not required.

- 解决方案

Debian has released advisory DSA 949-1 to address this issue. Please see the referenced advisory for more information.

- 相关参考