Package: armagetron
Version: 0.2.7.0-1.1
Severity: serious
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2006-3673: "nNetObject.cpp in Armagetron Advanced 2.8.2 and earlier
allows remote attackers to cause a denial of service (application crash)
via a large owner value, which causes an assert error."

CVE-2006-3674: "nNetObject.cpp in Armagetron Advanced 2.8.2 and earlier
allows remote attackers to cause a denial of service (CPU consumption)
via a large number handled by the id_req_handler function."

There are more specific details and vague instructions on how to
reproduce this issue in the original advisory [1].  I have not
attempted to reproduce either.  The same advisory claims that "a
patched version will be released soon"; their svn is giving me 503s
right now so I can't confirm if this has happened.

I have not verified if this is present in sarge.

Please mention the CVE in your changelog.

Thanks,

Alec

[1] http://aluigi.altervista.org/adv/atrondos-adv.txt

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEv/6cAud/2YgchcQRApDLAJ9BXxcP7Xru28dZ+C/2cAJE6XTZ4wCg0qLe
K146rXlifPW6iejDdWJYSb4=
=Mk/S
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to