[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE Request -- alienarena - 7.31
From:       Josh Bressers <bressers () redhat ! com>
Date:       2009-10-23 20:11:58
Message-ID: 1917268567.999661256328718470.JavaMail.root () zmail01 ! collab ! prod ! int ! phx2 ! redhat ! com
[Download RAW message or body]

Please use CVE-2009-3637.

Thanks.

-- 
    JB


----- "Jan Lieskovsky" <jlieskov@redhat.com> wrote:

> Hello Steve, vendors,
> 
>    remotely exploitable buffer overflow flaw by processing
> specially-crafted UDP reply from game
> server (leading to arbitrary code execution) was fixed in latest
> upstream alienarena-7.31
> release.
> 
> References:
> -----------
> http://www.ngssoftware.com/brochures/Anonymous.Remote.Arbitrary.Code.Execution.in.Alien.Arena.pdf
> (More descriptive issue details)
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552038 (Original
> source)
> http://icculus.org/alienarena/changelogs/7.31.txt (Revisions 1390 and
> 1391).
> 
> Upstream patch:
> ---------------
> http://svn.icculus.org/alienarena/trunk/source/client/menu.c?r1=1383&r2=1391
> (Merged change of 1390 and 1391)
> 
> Could you allocate a CVE identifier?
> 
> Thanks && Regards, Jan.
> --
> Jan iankko Lieskovsky / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic