发布时间 :2006-04-12 18:02:00
修订时间 :2008-09-05 17:02:44

[原文]Buffer overflow in pl_main.c in sail in BSDgames before 2.17-7 allows local users to execute arbitrary code via a long player name that is used in a scanf function call.

[CNNVD]BSD-Games pl_main.c 缓冲区溢出漏洞 (CNNVD-200604-182)

        BSDgames 2.17-7之前的版本中的pl_main.c存在缓冲区溢出。这使得本地用户可以借助于在scanf函数调用中使用的长的玩家名称执行任意代码。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  OSVDB  24634
(UNKNOWN)  BID  17401

- 漏洞信息

BSD-Games pl_main.c 缓冲区溢出漏洞
中危 缓冲区溢出
2006-04-12 00:00:00 2006-04-26 00:00:00
        BSDgames 2.17-7之前的版本中的pl_main.c存在缓冲区溢出。这使得本地用户可以借助于在scanf函数调用中使用的长的玩家名称执行任意代码。

- 公告与补丁

        bsd-games bsd-games 2.17
        Debian bsdgames_2.17-1sarge1_alpha.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_alpha.deb
        Debian bsdgames_2.17-1sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_amd64.deb
        Debian bsdgames_2.17-1sarge1_arm.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_arm.deb
        Debian bsdgames_2.17-1sarge1_hppa.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_hppa.deb
        Debian bsdgames_2.17-1sarge1_i386.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_i386.deb
        Debian bsdgames_2.17-1sarge1_ia64.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_ia64.deb
        Debian bsdgames_2.17-1sarge1_m68k.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_m68k.deb
        Debian bsdgames_2.17-1sarge1_mips.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_mips.deb
        Debian bsdgames_2.17-1sarge1_mipsel.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_mipsel.deb
        Debian bsdgames_2.17-1sarge1_powerpc.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_powerpc.deb
        Debian bsdgames_2.17-1sarge1_s390.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_s390.deb
        Debian bsdgames_2.17-1sarge1_sparc.deb
        Debian GNU/Linux 3.1 alias sarge 1sarge1_sparc.deb
        bsd-games bsd-games 2.13
        Debian bsdgames_2.13-7woody0_alpha.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_alpha.deb
        Debian bsdgames_2.13-7woody0_arm.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_arm.deb
        Debian bsdgames_2.13-7woody0_hppa.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_hppa.deb
        Debian bsdgames_2.13-7woody0_i386.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_i386.deb
        Debian bsdgames_2.13-7woody0_ia64.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_ia64.deb
        Debian bsdgames_2.13-7woody0_m68k.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_m68k.deb
        Debian bsdgames_2.13-7woody0_mips.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_mips.deb
        Debian bsdgames_2.13-7woody0_mipsel.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_mipsel.deb
        Debian bsdgames_2.13-7woody0_powerpc.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_powerpc.deb
        Debian bsdgames_2.13-7woody0_s390.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_s390.deb
        Debian bsdgames_2.13-7woody0_sparc.deb
        Debian GNU/Linux 3.0 alias woody 7woody0_sparc.deb

- 漏洞信息

bsdgames sail Username Local Overflow
Local Access Required Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

A local overflow exists in sail of bsdgames. The game fails to validate the size of input into the 'buf' variable, resulting in a buffer overflow. With a specially crafted request, an attacker can obtain the privileges of the games group, resulting in a loss of integrity.

- 时间线

2006-04-03 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.17-7 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

BSD-Games Multiple Local Buffer Overflow Vulnerabilities
Boundary Condition Error 17401
No Yes
2006-04-06 12:00:00 2006-12-07 03:29:00
Discovery is credited to Anibal L. Sacco <>.

- 受影响的程序版本

Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
Debian Linux 3.0
bsd-games bsd-games 2.14
bsd-games bsd-games 2.13
bsd-games bsd-games 2.12
bsd-games bsd-games 2.9
bsd-games bsd-games 2.17

- 漏洞讨论

Multiple games in the BSD-games package are prone to locally exploitable buffer-overflow vulnerabilities. These issues are due to insufficient bounds-checking when copying user-supplied input to insufficiently sized memory buffers.

Since these games are installed 'setgid games' on many operating systems, attackers may be able to exploit these issues to escalate privileges to this level.

- 漏洞利用

Currently we are not aware of any exploits for these issues. If you feel we are in error or are aware of more recent information, please mail us at:

- 解决方案

Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or are aware of more recent information, please mail us at:

Please see the references for more information and vendor advisories.

bsd-games bsd-games 2.17

bsd-games bsd-games 2.13

- 相关参考