SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Game)  >   LBreakout2 Vendors:   Speck, Michael
(Debian Issues Fix) LBreakout2 Buffer Overflow in HOME Environment May Let Local Users Obtain 'Games' Group Privileges
SecurityTracker Alert ID:  1009160
SecurityTracker URL:  http://securitytracker.com/id/1009160
CVE Reference:   CVE-2004-0158   (Links to External Site)
Date:  Feb 22 2004
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 2.4beta-2
Description:   A vulnerability was reported in LBreakout2 in the processing of the HOME environment variable. A local user can execute arbitrary code with elevated privileges.

It is reported that the software fails to perform proper bounds checking on the HOME environment variable. A local user can reportedly set the HOME environment to a specially crafted value to execute arbitrary code on the target system.

One some systems, the application is configured with 'games' group privileges, allowing the local user to obtain elevated ('games') group privileges.

The 'editor.c', 'theme.c', 'manager.c', 'config.c', 'game.c', 'levels.c', and 'main.c' files are reportedly affected.

[Editor's note: The security flaw was reported in November 2002 in the ChangeLog. Later, the flaw was reported by Debian in February 2004 with credit to Ulf Harnhammar, at which time the CVE number CVE-2004-0158 was assigned.]

Impact:   A local user can execute arbitrary code to obtain 'games' group privileges.
Solution:   Debian has released a fix for the current stable distribution (woody) in version 2.2.2-1woody1. A fix for the unstable distribution (sid) will be available soon.

Debian GNU/Linux 3.0 alias woody:

Source archives:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1.dsc
Size/MD5 checksum: 638 c2e605263d4d0ca08218e667d1299efa
http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1.diff.gz
Size/MD5 checksum: 5688 692094c7a0705bfd5f5595a6ce750977
http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2.orig.tar.gz
Size/MD5 checksum: 1215427 d5f0ef9371d7165723aa35a3e325a3ba

Alpha architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_alpha.deb
Size/MD5 checksum: 1157816 7ef7a54e5b3803ca672b57731cb95f9a

ARM architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_arm.deb
Size/MD5 checksum: 1126502 28bb2c780e0907c9d7f9862f459002f8

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_i386.deb
Size/MD5 checksum: 1112732 80fb5d46320ff2b8fae374a61b8ae5ba

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_ia64.deb
Size/MD5 checksum: 1182786 a899fab79519604d591c4a330783db64

HP Precision architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_hppa.deb
Size/MD5 checksum: 1136182 fa206bfef247e4a2feb48234f160bf49

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_m68k.deb
Size/MD5 checksum: 1110628 9bf1761c57b1fe866e32837cbcf99e71

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_mips.deb
Size/MD5 checksum: 1142782 d9d2dd4237685a9eec94e7c310e172db

PowerPC architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_powerpc.deb
Size/MD5 checksum: 1129844 f7bd1188ba6485798eb22e195ee938dd

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_s390.deb
Size/MD5 checksum: 1121760 5c49bbbfd9f582151bf3cb8b8a2e213a

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_sparc.deb
Size/MD5 checksum: 1124704 95231dbcc444a3f2e65603029e1f5e2c

Vendor URL:  lgames.sourceforge.net/index.php?project=LBreakout2 (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Debian)
Underlying OS Comments:  3.0

Message History:   This archive entry is a follow-up to the message listed below.
Feb 22 2004 LBreakout2 Buffer Overflow in HOME Environment May Let Local Users Obtain 'Games' Group Privileges



 Source Message Contents

Subject:  [SECURITY] [DSA 445-1] New lbreakout2 packages fix buffer overflow


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 445-1                     security@debian.org
http://www.debian.org/security/                             Matt Zimmerman
February 21st, 2004                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : lbreakout2
Vulnerability  : buffer overflow
Problem-Type   : local
Debian-specific: no
CVE Ids        : CAN-2004-0158

During an audit, Ulf Harnhammar discovered a vulnerability in
lbreakout2, a game, where proper bounds checking was not performed on
environment variables.  This bug could be exploited by a local
attacker to gain the privileges of group "games".

For the current stable distribution (woody) this problem has been
fixed in version 2.2.2-1woody1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you update your lbreakout2 package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1.dsc
      Size/MD5 checksum:      638 c2e605263d4d0ca08218e667d1299efa
    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1.diff.gz
      Size/MD5 checksum:     5688 692094c7a0705bfd5f5595a6ce750977
    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2.orig.tar.gz
      Size/MD5 checksum:  1215427 d5f0ef9371d7165723aa35a3e325a3ba

  Alpha architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_alpha.deb
      Size/MD5 checksum:  1157816 7ef7a54e5b3803ca672b57731cb95f9a

  ARM architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_arm.deb
      Size/MD5 checksum:  1126502 28bb2c780e0907c9d7f9862f459002f8

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_i386.deb
      Size/MD5 checksum:  1112732 80fb5d46320ff2b8fae374a61b8ae5ba

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_ia64.deb
      Size/MD5 checksum:  1182786 a899fab79519604d591c4a330783db64

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_hppa.deb
      Size/MD5 checksum:  1136182 fa206bfef247e4a2feb48234f160bf49

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_m68k.deb
      Size/MD5 checksum:  1110628 9bf1761c57b1fe866e32837cbcf99e71

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_mips.deb
      Size/MD5 checksum:  1142782 d9d2dd4237685a9eec94e7c310e172db

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_powerpc.deb
      Size/MD5 checksum:  1129844 f7bd1188ba6485798eb22e195ee938dd

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_s390.deb
      Size/MD5 checksum:  1121760 5c49bbbfd9f582151bf3cb8b8a2e213a

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1_sparc.deb
      Size/MD5 checksum:  1124704 95231dbcc444a3f2e65603029e1f5e2c

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAN+IvArxCt0PiXR4RAnnsAKCQPB/bgXtRLONeUw9srWDpS9/2AACg3q5y
0TJ0Basj6tfcKiNihw+BqJQ=
=qmt/
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC