Debians sikkerhedsbulletin

DSA-322-1 typespeed -- bufferoverløb

Rapporteret den:
16. jun 2003
Berørte pakker:
typespeed
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Bugtraq-databasen (hos SecurityFocus): BugTraq-id 7891.
I Mitres CVE-ordbog: CVE-2003-0435.
Yderligere oplysninger:

I spillet typespeed skal spilleren indtaste ord hurtigt og korrekt. Det indeholder en netværksspil-tilstand, der gør det muligt for spillere på forskellige systemer at dyste mod hinanden. Netværkskoden indeholder et bufferoverløb, der kunne give en fjernangriber mulighed for at udføre vilkårlig kode med rettighederne tilhørende den bruger, der kører typespeed, ud over gid games.

I den stabile distribution (woody) er dette problem rettet i version 0.4.1-2.2.

I den gamle stabile distribution (potato) er dette problem rettet i version 0.4.0-5.2.

I den ustabile distribution (sid) vil dette problem snart blive rettet.

Vi anbefaler at du opdaterer din typespeed-pakke.

Rettet i:

Debian GNU/Linux 2.2 (potato)

Kildekode:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.0-5.2.dsc
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.0-5.2.diff.gz
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.0.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.0-5.2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.0-5.2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.0-5.2_i386.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.0-5.2_m68k.deb
PowerPC:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.0-5.2_powerpc.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.0-5.2_sparc.deb

Debian GNU/Linux 3.0 (woody)

Kildekode:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2.dsc
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2.diff.gz
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/t/typespeed/typespeed_0.4.1-2.2_sparc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.