Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=200545
Summary: CVE-2006-3913, freeciv: server buffer overflow issues
Product: Fedora Extras
Version: fc5
Platform: All
URL:
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3913
OS/Version: Linux
Status: NEW
Severity: normal
Priority: normal
Component: freeciv
AssignedTo: bdpepple(a)ameritech.net
ReportedBy: ville.skytta(a)iki.fi
QAContact: extras-qa(a)fedoraproject.org
CC: extras-qa(a)fedoraproject.org,fedora-security-
list(a)redhat.com
CVE-2006-3913,
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3913 :
Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul 2006 and
earlier, allows remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code via a (1) negative chunk_length or a (2) large
chunk->offset value in a PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the
generic_handle_player_attribute_chunk function in common/packets.c, and (3) a
large packet->length value in the handle_unit_orders function in server/unithand.c.
All FE-[345] and devel are probably affected.
--
Configure bugmail:
https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.