CVE-2006-1744
CVSS4.6
发布时间 :2006-04-12 18:02:00
修订时间 :2008-09-05 17:02:44
NMCOS    

[原文]Buffer overflow in pl_main.c in sail in BSDgames before 2.17-7 allows local users to execute arbitrary code via a long player name that is used in a scanf function call.


[CNNVD]BSD-Games pl_main.c 缓冲区溢出漏洞 (CNNVD-200604-182)

        BSDgames 2.17-7之前的版本中的pl_main.c存在缓冲区溢出。这使得本地用户可以借助于在scanf函数调用中使用的长的玩家名称执行任意代码。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:joey_hess:bsdgames:2.12
cpe:/a:joey_hess:bsdgames:2.14
cpe:/a:joey_hess:bsdgames:2.13
cpe:/a:joey_hess:bsdgames:2.9
cpe:/a:joey_hess:bsdgames:2.17

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1744
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1744
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-182
(官方数据源) CNNVD

- 其它链接及资源

http://www.osvdb.org/24634
(PATCH)  OSVDB  24634
http://www.debian.org/security/2006/dsa-1036
(VENDOR_ADVISORY)  DEBIAN  DSA-1036
http://secunia.com/advisories/19687
(VENDOR_ADVISORY)  SECUNIA  19687
http://www.securityfocus.com/bid/17401
(UNKNOWN)  BID  17401
http://www.pulltheplug.org/fu/?q=node/56
(UNKNOWN)  MISC  http://www.pulltheplug.org/fu/?q=node/56
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=360989
(UNKNOWN)  CONFIRM  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=360989
http://securityreason.com/securityalert/736
(UNKNOWN)  SREASON  736

- 漏洞信息

BSD-Games pl_main.c 缓冲区溢出漏洞
中危 缓冲区溢出
2006-04-12 00:00:00 2006-04-26 00:00:00
本地  
        BSDgames 2.17-7之前的版本中的pl_main.c存在缓冲区溢出。这使得本地用户可以借助于在scanf函数调用中使用的长的玩家名称执行任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        bsd-games bsd-games 2.17
        Debian bsdgames_2.17-1sarge1_alpha.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_alpha.deb
        Debian bsdgames_2.17-1sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_amd64.deb
        Debian bsdgames_2.17-1sarge1_arm.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_arm.deb
        Debian bsdgames_2.17-1sarge1_hppa.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_hppa.deb
        Debian bsdgames_2.17-1sarge1_i386.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_i386.deb
        Debian bsdgames_2.17-1sarge1_ia64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_ia64.deb
        Debian bsdgames_2.17-1sarge1_m68k.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_m68k.deb
        Debian bsdgames_2.17-1sarge1_mips.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_mips.deb
        Debian bsdgames_2.17-1sarge1_mipsel.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_mipsel.deb
        Debian bsdgames_2.17-1sarge1_powerpc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_powerpc.deb
        Debian bsdgames_2.17-1sarge1_s390.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_s390.deb
        Debian bsdgames_2.17-1sarge1_sparc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17- 1sarge1_sparc.deb
        bsd-games bsd-games 2.13
        Debian bsdgames_2.13-7woody0_alpha.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_alpha.deb
        Debian bsdgames_2.13-7woody0_arm.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_arm.deb
        Debian bsdgames_2.13-7woody0_hppa.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_hppa.deb
        Debian bsdgames_2.13-7woody0_i386.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_i386.deb
        Debian bsdgames_2.13-7woody0_ia64.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_ia64.deb
        Debian bsdgames_2.13-7woody0_m68k.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_m68k.deb
        Debian bsdgames_2.13-7woody0_mips.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_mips.deb
        Debian bsdgames_2.13-7woody0_mipsel.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_mipsel.deb
        Debian bsdgames_2.13-7woody0_powerpc.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_powerpc.deb
        Debian bsdgames_2.13-7woody0_s390.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_s390.deb
        Debian bsdgames_2.13-7woody0_sparc.deb
        Debian GNU/Linux 3.0 alias woody
        http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13- 7woody0_sparc.deb
        

- 漏洞信息

24634
bsdgames sail Username Local Overflow
Local Access Required Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

A local overflow exists in sail of bsdgames. The game fails to validate the size of input into the 'buf' variable, resulting in a buffer overflow. With a specially crafted request, an attacker can obtain the privileges of the games group, resulting in a loss of integrity.

- 时间线

2006-04-03 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.17-7 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

BSD-Games Multiple Local Buffer Overflow Vulnerabilities
Boundary Condition Error 17401
No Yes
2006-04-06 12:00:00 2006-12-07 03:29:00
Discovery is credited to Anibal L. Sacco <Anibal.Sacco@gmail.com>.

- 受影响的程序版本

Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
Debian Linux 3.0
bsd-games bsd-games 2.14
bsd-games bsd-games 2.13
bsd-games bsd-games 2.12
bsd-games bsd-games 2.9
bsd-games bsd-games 2.17

- 漏洞讨论

Multiple games in the BSD-games package are prone to locally exploitable buffer-overflow vulnerabilities. These issues are due to insufficient bounds-checking when copying user-supplied input to insufficiently sized memory buffers.

Since these games are installed 'setgid games' on many operating systems, attackers may be able to exploit these issues to escalate privileges to this level.

- 漏洞利用


Currently we are not aware of any exploits for these issues. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案



Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.commailto:vuldb@securityfocus.com

Please see the references for more information and vendor advisories.


bsd-games bsd-games 2.17

bsd-games bsd-games 2.13

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站