首页 -> 安全研究

安全研究

安全漏洞
XPilot服务器远程缓冲区溢出漏洞

发布日期:2002-04-17
更新日期:2002-04-25

受影响系统:
XPilot XPilot 4.5.0
XPilot XPilot 4.4.3
XPilot XPilot 4.4.2
XPilot XPilot 4.4.1
XPilot XPilot 4.4.0
XPilot XPilot 4.3.2
XPilot XPilot 4.3.1
XPilot XPilot 4.3.0
XPilot XPilot 4.2.1
XPilot XPilot 4.2.0
XPilot XPilot 4.0.0
XPilot XPilot 4.1.0
    - Debian Linux 2.2
不受影响系统:
XPilot XPilot 4.5.2
XPilot XPilot 4.5.1
描述:
BUGTRAQ  ID: 4534
CVE(CAN) ID: CVE-2002-0179

XPilot是一款多用户2D即时策略游戏,可运行再多种Linux操作系统下。

XPilot由于对用户提交的数据缺少正确的检查,可导致缓冲区溢出。

攻击者可以对XPilot服务器进行缓冲区溢出攻击,并以XPilot进程的权限在目标系统上执行任意命令。

没有更详细的漏洞描述。

<*来源:Wichert Akkerman (wichert@wiggy.net
  
  链接:http://archives.neohapsis.com/archives/bugtraq/2002-04/0191.html
        http://www.debian.org/security/2002/dsa-127
*>

建议:
临时解决方法:

如果您不能立刻安装补丁或者升级,NSFOCUS建议您采取以下措施以降低威胁:

* 暂时没有合适的临时解决方法。

厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-127-1)以及相应补丁:
DSA-127-1:buffer overflow in xpilot-server
链接:http://www.debian.org/security/2002/dsa-127

补丁下载:

Source archives:
http://security.debian.org/dists/stable/updates/main/source/xpilot_4.1.0-4.U.4alpha2.4.potato1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/xpilot_4.1.0-4.U.4alpha2.4.potato1.dsc
http://security.debian.org/dists/stable/updates/main/source/xpilot_4.1.0.orig.tar.gz

Architecture independent archives:
http://security.debian.org/dists/stable/updates/main/binary-all/xpilot_4.1.0-4.U.4alpha2.4.potato1_all.deb

Alpha architecture:
http://security.debian.org/dists/stable/updates/main/binary-alpha/xpilot-client-nas_4.1.0-4.U.4alpha2.4.potato1_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/xpilot-client-nosound_4.1.0-4.U.4alpha2.4.potato1_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/xpilot-client-rplay_4.1.0-4.U.4alpha2.4.potato1_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/xpilot-server_4.1.0-4.U.4alpha2.4.potato1_alpha.deb

Intel IA-32 architecture:
http://security.debian.org/dists/stable/updates/main/binary-i386/xpilot-client-nas_4.1.0-4.U.4alpha2.4.potato1_i386.deb
http://security.debian.org/dists/stable/updates/main/binary-i386/xpilot-client-nosound_4.1.0-4.U.4alpha2.4.potato1_i386.deb
http://security.debian.org/dists/stable/updates/main/binary-i386/xpilot-client-rplay_4.1.0-4.U.4alpha2.4.potato1_i386.deb
http://security.debian.org/dists/stable/updates/main/binary-i386/xpilot-server_4.1.0-4.U.4alpha2.4.potato1_i386.deb

Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/main/binary-m68k/xpilot-client-nas_4.1.0-4.U.4alpha2.4.potato1_m68k.deb
http://security.debian.org/dists/stable/updates/main/binary-m68k/xpilot-client-nosound_4.1.0-4.U.4alpha2.4.potato1_m68k.deb
http://security.debian.org/dists/stable/updates/main/binary-m68k/xpilot-client-rplay_4.1.0-4.U.4alpha2.4.potato1_m68k.deb
http://security.debian.org/dists/stable/updates/main/binary-m68k/xpilot-server_4.1.0-4.U.4alpha2.4.potato1_m68k.deb

PowerPC architecture:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xpilot-client-nas_4.1.0-4.U.4alpha2.4.potato1_powerpc.deb
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xpilot-client-nosound_4.1.0-4.U.4alpha2.4.potato1_powerpc.deb
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xpilot-client-rplay_4.1.0-4.U.4alpha2.4.potato1_powerpc.deb
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xpilot-server_4.1.0-4.U.4alpha2.4.potato1_powerpc.deb

Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/main/binary-sparc/xpilot-client-nas_4.1.0-4.U.4alpha2.4.potato1_sparc.deb
http://security.debian.org/dists/stable/updates/m


补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

浏览次数:3176
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障