CVE-2006-3790
CVSS5.0
发布时间 :2006-07-24 08:19:00
修订时间 :2011-03-07 21:39:29
NMCOP    

[原文]The decode_stringmap function in server_transport.cpp for UFO2000 svn 1057 allows remote attackers to cause a denial of service (daemon termination) via a keysize or valsize that is inconsistent with the packet size, which leads to a buffer over-read.


[CNNVD]UFO2000 svn 1057 'server_transport.cpp'拒绝服务漏洞(CNNVD-200607-379)

        UFO2000 svn 1057的server_transport.cpp中的decode_stringmap函数可以使远程攻击者借助与数据包大小不符的keysize或valsize,造成缓冲区通读,从而引起拒绝服务(daemon终止)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3790
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3790
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200607-379
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/2837
(UNKNOWN)  VUPEN  ADV-2006-2837
http://www.securityfocus.com/archive/1/archive/1/440293/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060716 Multiple vulnerabilities in UFO2000 svn 1057
http://svn.sourceforge.net/viewcvs.cgi/ufo2000/trunk/src/server_transport.cpp?view=log
(UNKNOWN)  CONFIRM  http://svn.sourceforge.net/viewcvs.cgi/ufo2000/trunk/src/server_transport.cpp?view=log
http://securitytracker.com/id?1016503
(UNKNOWN)  SECTRACK  1016503
http://secunia.com/advisories/21091
(VENDOR_ADVISORY)  SECUNIA  21091
http://aluigi.altervista.org/adv/ufo2ko-adv.txt
(UNKNOWN)  MISC  http://aluigi.altervista.org/adv/ufo2ko-adv.txt
http://xforce.iss.net/xforce/xfdb/27800
(UNKNOWN)  XF  ufo2000-decodestringmap-dos(27800)
http://www.securityfocus.com/bid/19035
(UNKNOWN)  BID  19035
http://www.gentoo.org/security/en/glsa/glsa-200702-10.xml
(UNKNOWN)  GENTOO  GLSA-200702-10
http://securityreason.com/securityalert/1259
(UNKNOWN)  SREASON  1259
http://secunia.com/advisories/24297
(UNKNOWN)  SECUNIA  24297

- 漏洞信息

UFO2000 svn 1057 'server_transport.cpp'拒绝服务漏洞
中危 边界条件错误
2006-07-24 00:00:00 2006-07-25 00:00:00
远程  
        UFO2000 svn 1057的server_transport.cpp中的decode_stringmap函数可以使远程攻击者借助与数据包大小不符的keysize或valsize,造成缓冲区通读,从而引起拒绝服务(daemon终止)。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        UFO2000 UFO2000 SVN 1057
        UFO2000 ufo2000-0.6.627.tar.gz
        http://prdownloads.sourceforge.net/ufo2000/ufo2000-0.6.627.tar.gz
        

- 漏洞信息 (F54721)

Gentoo Linux Security Advisory 200702-10 (PacketStormID:F54721)
2007-02-28 00:00:00
Gentoo  security.gentoo.org
advisory,overflow,vulnerability,sql injection
linux,gentoo
CVE-2006-3788,CVE-2006-3789,CVE-2006-3790,CVE-2006-3791,CVE-2006-3792
[点击下载]

Gentoo Linux Security Advisory GLSA 200702-10 - Five vulnerabilities were found: a buffer overflow in recv_add_unit(); a problem with improperly trusting user-supplied string information in decode_stringmap(); several issues with array manipulation via various commands during play; an SQL injection in server_protocol.cpp; and finally, a second buffer overflow in recv_map_data(). Versions less than 0.7.1062 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200702-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: UFO2000: Multiple vulnerabilities
      Date: February 25, 2007
      Bugs: #142392
        ID: 200702-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in the network components of
UFO2000 that could result in the remote execution of arbitrary code.

Background
==========

UFO2000 is a multi-player, turn-based tactical simulation.

Affected packages
=================

    -------------------------------------------------------------------
     Package                 /  Vulnerable  /               Unaffected
    -------------------------------------------------------------------
  1  games-strategy/ufo2000     < 0.7.1062                 >= 0.7.1062

Description
===========

Five vulnerabilities were found: a buffer overflow in recv_add_unit();
a problem with improperly trusting user-supplied string information in
decode_stringmap(); several issues with array manipulation via various
commands during play; an SQL injection in server_protocol.cpp; and
finally, a second buffer overflow in recv_map_data().

Impact
======

An attacker could send crafted network traffic as part of a
multi-player game that could result in remote code execution on the
remote opponent or the server. A remote attacker could also run
arbitrary SQL queries against the server account database, and perform
a Denial of Service on a remote opponent by causing the game to crash.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

UFO2000 currently depends on the dumb-0.9.2 library, which has been
removed from portage due to security problems (GLSA 200608-14) .
Because of this, UFO2000 has been masked, and we recommend unmerging
the package until the next beta release can remove the dependency on
dumb.

    # emerge --ask --verbose --unmerge ufo2000

References
==========

  [ 1 ] CVE-2006-3788
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3788
  [ 2 ] CVE-2006-3789
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3789
  [ 3 ] CVE-2006-3790
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3790
  [ 4 ] CVE-2006-3791
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3791
  [ 5 ] CVE-2006-3792
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3792
  [ 6 ] GLSA 200608-14
        http://www.gentoo.org/security/en/glsa/glsa-200608-14.xml

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200702-10.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5
    

- 漏洞信息

27342
UFO2000 server_transport.cpp decode_stringmap Function Memory Corruption Remote DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-07-16 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站