blob: 5b5e5a435df7ab388652a501c3429ab9f153ccc5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200602-09">
<title>BomberClone: Remote execution of arbitrary code</title>
BomberClone is vulnerable to a buffer overflow which may lead to remote
execution of arbitrary code.
<product type="ebuild">games-action/bomberclone</product>
<announced>February 16, 2006</announced>
<revised>February 16, 2006: 01</revised>
<package name="games-action/bomberclone" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
BomberClone is a remake of the classic game "BomberMan". It
supports multiple players via IP network connection.
Stefan Cornelius of the Gentoo Security team discovered multiple
missing buffer checks in BomberClone's code.
<impact type="high">
By sending overly long error messages to the game via network, a
remote attacker may exploit buffer overflows to execute arbitrary code
with the rights of the user running BomberClone.
There is no known workaround at this time.
All BomberClone users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=games-action/bomberclone-;</code>
<uri link="">CVE-2006-0460</uri>
<metadata tag="requester" timestamp="Tue, 14 Feb 2006 17:56:10 +0000">
<metadata tag="bugReady" timestamp="Tue, 14 Feb 2006 17:58:09 +0000">
<metadata tag="submitter" timestamp="Wed, 15 Feb 2006 11:54:36 +0000">