Debian Security Advisory
DSA-1180-1 bomberclone -- programming error
- Date Reported:
- 19 Sep 2006
- Affected Packages:
- bomberclone
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 382082.
In Mitre's CVE dictionary: CVE-2006-4005, CVE-2006-4006. - More information:
-
Luigi Auriemma discovered two security related bugs in bomberclone, a free Bomberman clone. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2006-4005
The program copies remotely provided data unchecked which could lead to a denial of service via an application crash.
- CVE-2006-4006
Bomberclone uses remotely provided data as length argument which can lead to the disclosure of private information.
For the stable distribution (sarge) these problems have been fixed in version 0.11.5-1sarge2.
For the unstable distribution (sid) these problems have been fixed in version 0.11.7-0.1.
We recommend that you upgrade your bomberclone package.
- CVE-2006-4005
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2.dsc
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2.diff.gz
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5.orig.tar.gz
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone-data_0.11.5-1sarge2_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_arm.deb
- HPPA:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_ia64.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/b/bomberclone/bomberclone_0.11.5-1sarge2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.