From 19de9acd4d2fd69ccbc07b137c71185aad3c41ca Mon Sep 17 00:00:00 2001 From: Christian Weisgerber Date: Thu, 2 Dec 2004 21:04:06 +0000 Subject: Document buffer overflows in rockdodger. --- security/vuxml/vuln.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index eddc01099479..c25eb5c6e496 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + rockdodger -- buffer overflows + + + rockdodger + 0.6_3 + + + + +

The environment variable HOME is copied without regard + to buffer size, which can be used to gain elevated privilege + if the binary is installed setgid games, and a string is + read from the high score file without bounds check.

+

The port installs the binary without setgid, but with a + world-writable high score file.

+ +
+ + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278878 + + + 2004-10-29 + 2004-12-02 + +
+ zip -- long path buffer overflow -- cgit v1.2.3