[Bug 200545] New: CVE-2006-3913, freeciv: server buffer overflow issues

bugzilla at redhat.com bugzilla at redhat.com
Fri Jul 28 15:51:14 UTC 2006


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.




https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=200545

           Summary: CVE-2006-3913, freeciv: server buffer overflow issues
           Product: Fedora Extras
           Version: fc5
          Platform: All
               URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3913
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: normal
         Component: freeciv
        AssignedTo: bdpepple at ameritech.net
        ReportedBy: ville.skytta at iki.fi
         QAContact: extras-qa at fedoraproject.org
                CC: extras-qa at fedoraproject.org,fedora-security-
                    list at redhat.com


CVE-2006-3913, http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3913 :

Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul 2006 and
earlier, allows remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code via a (1) negative chunk_length or a (2) large
chunk->offset value in a PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the
generic_handle_player_attribute_chunk function in common/packets.c, and (3) a
large packet->length value in the handle_unit_orders function in server/unithand.c.

All FE-[345] and devel are probably affected.

-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.




More information about the security mailing list