Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New crossfire packages fix arbitrary code execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1001-1                                   Moritz Muehlenhoff
March 14th, 2006              
- --------------------------------------------------------------------------

Package        : crossfire
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-1010

It was discovered that Crossfire, a multiplayer adventure game, performs
insufficient bounds checking on network packets when run in "oldsocketmode",
which may possibly lead to the execution of arbitrary code.

For the old stable distribution (woody) this problem has been fixed in
version 1.1.0-1woody1.

For the stable distribution (sarge) this problem has been fixed in
version 1.6.0.dfsg.1-4sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 1.9.0-1.

We recommend that you upgrade your crossfire packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      646 4ff35e7baf70ac9b4d876a343df40523
      Size/MD5 checksum:    46407 7071659d9ec374fb41e20c5016f3a238
      Size/MD5 checksum:  3057431 824e6d9a91ee0321629a9e99ad4e264f

  Architecture independent components:
      Size/MD5 checksum:   584300 aa7bf89a453427102d7eec4901958158

  Alpha architecture:
      Size/MD5 checksum:   193680 4553b585641d5db5f9d3e903cbbe6398
      Size/MD5 checksum:  2097780 26d3b684b495b0f76fa405baffff8a9c

  ARM architecture:
      Size/MD5 checksum:   156280 fb833dd6ddea050831a878f4d5dac277
      Size/MD5 checksum:  1993866 fc828be05ece9869a8b09efda952ac47

  Intel IA-32 architecture:
      Size/MD5 checksum:   141064 04096cf1a3b3f82ad6a1b2d75e125990
      Size/MD5 checksum:  1954024 24b5735f4f798b110e11cab773b94e5f

  Intel IA-64 architecture:
      Size/MD5 checksum:   243704 13d507b4def182c7eb01b0aaa3542e29
      Size/MD5 checksum:  2223706 5ff21345dda8ae6f76165f9b96834b0b

  HP Precision architecture:
      Size/MD5 checksum:   175512 7a53530fe3a05303eef58f1306c761dc
      Size/MD5 checksum:  2047542 77c5b0976be319841e9f7d9a494633e9

  Motorola 680x0 architecture:
      Size/MD5 checksum:   134514 73f71be557835f00d90110c0e26b585c
      Size/MD5 checksum:  1925234 7b19ddb9146470eed7476a9ddcb6df9d

  Big endian MIPS architecture:
      Size/MD5 checksum:   170386 64dcc9e48ef8cad2c7f49d912c48af4c
      Size/MD5 checksum:  2034962 8c961860a9608559ffcbb3491e3aa91d

  Little endian MIPS architecture:
      Size/MD5 checksum:   169156 128739ca220efa5f4c99aa75ba372e48
      Size/MD5 checksum:  2034944 d4c48f6b3321ab16858019fb24a990f4

  PowerPC architecture:
      Size/MD5 checksum:   159470 9b7d6cd71d50bf74c0d86de967583e95
      Size/MD5 checksum:  1998154 e22fc08568e1ad53d00232974ae4a9b1

  IBM S/390 architecture:
      Size/MD5 checksum:   146038 77725d3b5096df841f4cc07122c7c374
      Size/MD5 checksum:  1969130 3419823da4526d93c4ff51422944b292

  Sun Sparc architecture:
      Size/MD5 checksum:   156446 5c15333247f6b01c5fe0f82f74793a05
      Size/MD5 checksum:  1986454 86501cb8bbdde74d5ed1daa3e28fa1b1

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      710 47cf0dc050c3dc4db58feeac549aed6a
      Size/MD5 checksum:   283564 f407edbb32e765296efe129e603fec6f
      Size/MD5 checksum:  4329330 67c8ee71b0539d369231764b19cc787e

  Architecture independent components:
      Size/MD5 checksum:   888620 2fe92277b2bd97e3440234fb65817fac

  Alpha architecture:
      Size/MD5 checksum:   374622 e83523a6abcb34c15d1c9f32c371089c
      Size/MD5 checksum:  2758858 28c6d5160b86915dfcdac14bdb4f06c7

  AMD64 architecture:
      Size/MD5 checksum:   340890 80a175aa2524814233248fac42766563
      Size/MD5 checksum:  2643524 6e1771cf2c74e2154c6cc22c62f4681d

  ARM architecture:
      Size/MD5 checksum:   333436 6def0c031898c5ec8246ccc0dd2511e6
      Size/MD5 checksum:  2639280 95872038843c495c25793f95c9ba2580

  Intel IA-32 architecture:
      Size/MD5 checksum:   331954 aedcbf3efa10e18e2853d67006aa21d1
      Size/MD5 checksum:  2625970 47c01f7b6c84046dfbf9a6a2915ae175

  Intel IA-64 architecture:
      Size/MD5 checksum:   409386 3f688ee42afd52b1ee6a7a3a46435c14
      Size/MD5 checksum:  2853944 8de1e21285619250aef448616a577bed

  HP Precision architecture:
      Size/MD5 checksum:   351444 8ee33d936f8e4a07e4035e1160a84036
      Size/MD5 checksum:  2681792 d0a273db4abcfc9231a19332ad843c1d

  Motorola 680x0 architecture:
      Size/MD5 checksum:   307588 9908a5d79b36a911c4f46215ebd02862
      Size/MD5 checksum:  2569634 222e9afbaa4bcb7182031ed72af4bc28

  Big endian MIPS architecture:
      Size/MD5 checksum:   348636 f750bed26179ba592aea5e4d79f3e2bb
      Size/MD5 checksum:  2657484 432448d5d3ae242f95604aee81edc252

  Little endian MIPS architecture:
      Size/MD5 checksum:   346952 32515c7690ce503fbe1651122b7795ad
      Size/MD5 checksum:  2656172 7ff1f217d75468a101f09c67e6674604

  PowerPC architecture:
      Size/MD5 checksum:   339274 7d54740e5324c9d50b6114c6cb84ccb2
      Size/MD5 checksum:  2651374 973073875b386fd8ac3fbfa7b77b2147

  IBM S/390 architecture:
      Size/MD5 checksum:   336618 acb44c42b2a086051324c1a647875bb4
      Size/MD5 checksum:  2641718 5713c0271c677bb6d172ce0df82f7b96

  Sun Sparc architecture:
      Size/MD5 checksum:   330882 32e90607bd43ebb138af8fb5ba168934
      Size/MD5 checksum:  2626822 e763b98558e078806c0bb357ec3fc2ee

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.