|
Message-ID: <4AE16FF1.3030308@redhat.com> Date: Fri, 23 Oct 2009 10:57:21 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com> Subject: CVE Request -- alienarena - 7.31 Hello Steve, vendors, remotely exploitable buffer overflow flaw by processing specially-crafted UDP reply from game server (leading to arbitrary code execution) was fixed in latest upstream alienarena-7.31 release. References: ----------- http://www.ngssoftware.com/brochures/Anonymous.Remote.Arbitrary.Code.Execution.in.Alien.Arena.pdf (More descriptive issue details) http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552038 (Original source) http://icculus.org/alienarena/changelogs/7.31.txt (Revisions 1390 and 1391). Upstream patch: --------------- http://svn.icculus.org/alienarena/trunk/source/client/menu.c?r1=1383&r2=1391 (Merged change of 1390 and 1391) Could you allocate a CVE identifier? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.