Debian Security Advisory
DSA-189-1 luxman -- local root exploit
- Date Reported:
- 06 Nov 2002
- Affected Packages:
- luxman
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2002-1245.
- More information:
-
iDEFENSE reported about a vulnerability in LuxMan, a maze game for GNU/Linux, similar to the PacMan arcade game. When successfully exploited a local attacker gains read-write access to the memory, leading to a local root compromise in many ways, examples of which include scanning the file for fragments of the master password file and modifying kernel memory to re-map system calls.
This problem has been fixed in version 0.41-17.1 for the current stable distribution (woody) and in version 0.41-19 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn't contain a luxman package.
We recommend that you upgrade your luxman package immediately.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.1.dsc
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.1.diff.gz
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41.orig.tar.gz
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.1.diff.gz
- Intel IA-32:
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.1_i386.deb
MD5 checksums of the listed files are available in the original advisory.