Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 18 Dec 2012 10:04:49 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- Freeciv (X < 2.3.3): DoS (memory
 exhaustion or excessive CPU consumption) via malformed network packets

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/18/2012 07:13 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
> 
> Freeciv upstream has released 2.3.3 version correcting one security
> issue:
> 
> A denial of service flaw was found in the way the server component 
> of Freeciv, a turn-based, multi-player, X based strategy game, 
> processed certain packets (invalid packets with whole packet
> length lower than packet header size or syntactically valid
> packets, but whose processing would lead to an infinite loop). A
> remote attacker could send a specially-crafted packet that, when
> processed would lead to freeciv server to terminate (due to memory
> exhaustion) or become unresponsive (due to excessive CPU use).
> 
> References: [1] http://aluigi.altervista.org/adv/freecivet-adv.txt 
> [2] https://bugs.gentoo.org/show_bug.cgi?id=447490 [3]
> http://freeciv.wikia.com/wiki/NEWS-2.3.3 [4]
> https://bugzilla.redhat.com/show_bug.cgi?id=888331
> 
> Upstream bug report: [5] http://gna.org/bugs/?20003
> 
> Relevant patch (against trunk): [6]
> http://svn.gna.org/viewcvs/freeciv?view=revision&revision=21670
> 
> Could you allocate a CVE id for this?
> 
> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team

Please use CVE-2012-5645 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBAgAGBQJQ0KIxAAoJEBYNRVNeJnmTTigQAJ/zsEZ07mUjKA2zMh1EOH3v
CD1UgfkRQ0/lym+Eg55JGzSRzXai7yfWhhp1T+jsLqED4+kKGryJFE1eprvyRMdL
Je7PAZl67sfrdVW+nBOFUhlIIc7jiKp2vGqj826M4nzcRZbWdYL9hdFhqxlDEnyq
8dx623jwPOiMFv5N3epX3aE7T5F92MAwGZrPu3tqI4E+B+ho4o12Z2OxZvoS6azG
FZNWdl9QJ607+YI9Dd2JZ3kpa/T+k9IEImjvCP6QHnmc4UDQVmMPoyV4UXXyleDS
8kEZLuKzJ2x5+pC/NcHjyt9chOovSuFkbCQut3WYBENz1qZBjyThjEbxfoFATAR+
sAiRLoM6+rmNN5pBFFKiIypXCsaHz5PbWLXNWZkjGYsitHvNrY7vp700jweMXMFh
hR9VlRw0zgBja5PYq5S8B/25YcmwzGtpl4zQBFBYJDv+v3WJE07yWeVCY50zEI3c
jQ4yG7n8rJE0/tEHdNrIP4zBbYjmLoi3KtgEaSzDfMGIo4qHPbGbHg9fOZqBSv6S
XSm/mVOsV4cwWrcUJFyQolEXCjUtuj/hqVY8tNUPCnUlUo3c3PAoQGGM+Cvx584Z
0R6SPuni35ABgKJznjvectvaiTD9CMVX1DZHj0sJtoaSUkr9MB1UuDB1/ADpO+t5
6pVDRu12YymToTPHKzHh
=cXYM
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ