Gentoo Archives: gentoo-announce

From: Stefan Cornelius <dercorny@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200603-10 ] Cube: Multiple vulnerabilities
Date: Mon, 13 Mar 2006 00:36:58
Message-Id: 200603130122.49283.dercorny@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200603-10
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Cube: Multiple vulnerabilities
9 Date: March 13, 2006
10 Bugs: #125289
11 ID: 200603-10
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Cube is vulnerable to a buffer overflow, invalid memory access and
19 remote client crashes, possibly leading to a Denial of Service or
20 remote code execution.
21
22 Background
23 ==========
24
25 Cube is an open source first person shooter game engine supporting
26 multiplayer via LAN or internet.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 games-fps/cube <= 20050829 Vulnerable!
35 -------------------------------------------------------------------
36 NOTE: Certain packages are still vulnerable. Users should migrate
37 to another package if one is available or wait for the
38 existing packages to be marked stable by their
39 architecture maintainers.
40
41 Description
42 ===========
43
44 Luigi Auriemma reported that Cube is vulnerable to a buffer overflow in
45 the sgetstr() function (CVE-2006-1100) and that the sgetstr() and
46 getint() functions fail to verify the length of the supplied argument,
47 possibly leading to the access of invalid memory regions
48 (CVE-2006-1101). Furthermore, he discovered that a client crashes when
49 asked to load specially crafted mapnames (CVE-2006-1102).
50
51 Impact
52 ======
53
54 A remote attacker could exploit the buffer overflow to execute
55 arbitrary code with the rights of the user running cube. An attacker
56 could also exploit the other vulnerabilities to crash a Cube client or
57 server, resulting in a Denial of Service.
58
59 Workaround
60 ==========
61
62 Play solo games or restrict your multiplayer games to trusted parties.
63
64 Resolution
65 ==========
66
67 Upstream stated that there will be no fixed version of Cube, thus the
68 Gentoo Security Team decided to hardmask Cube for security reasons. All
69 Cube users are encouraged to uninstall Cube:
70
71 # emerge --ask --unmerge games-fps/cube
72
73 References
74 ==========
75
76 [ 1 ] CVE-2006-1100
77 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1100
78 [ 2 ] CVE-2006-1101
79 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1101
80 [ 3 ] CVE-2006-1102
81 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1102
82
83 Availability
84 ============
85
86 This GLSA and any updates to it are available for viewing at
87 the Gentoo Security Website:
88
89 http://security.gentoo.org/glsa/glsa-200603-10.xml
90
91 Concerns?
92 =========
93
94 Security is a primary focus of Gentoo Linux and ensuring the
95 confidentiality and security of our users machines is of utmost
96 importance to us. Any security concerns should be addressed to
97 security@g.o or alternatively, you may file a bug at
98 http://bugs.gentoo.org.
99
100 License
101 =======
102
103 Copyright 2006 Gentoo Foundation, Inc; referenced text
104 belongs to its owner(s).
105
106 The contents of this document are licensed under the
107 Creative Commons - Attribution / Share Alike license.
108
109 http://creativecommons.org/licenses/by-sa/2.0