Urban Game Buffer Overflows Let Local Users Gain Elevated Privileges
|
|
SecurityTracker Alert ID: 1014848 |
|
SecurityTracker URL: http://securitytracker.com/id/1014848
|
|
CVE Reference:
CVE-2005-2810
(Links to External Site)
|
Updated: Jun 8 2008
|
Original Entry Date: Sep 3 2005
|
Impact:
Execution of arbitrary code via local system, User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 1.5.3
|
Description:
A vulnerability was reported in Urban. A local user can gain elevated privileges.
A local user can supply a specially crafted HOME environment variable value to trigger any of several stack-based buffer overflows in the processing of filenames. Arbitrary code can be executed with 'games' group privileges.
The 'config/config.cc', 'engine/game.cc', 'highscor/highscor.cc. and 'meny/meny.cc' files are affected.
Shaun at rsc.cx discovered this vulnerability.
|
Impact:
A local user can execute arbitrary code with 'games' group privileges.
|
Solution:
A source code fix (for FreeBSD) is available via CVS at:
http://www.freebsd.org/cgi/cvsweb.cgi/ports/games/urban/
|
Vendor URL: urban.bengburken.net/ (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
|
[Original Message Not Available for Viewing]
|
|