FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-12-18 05:51:40 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
e25566d5-6d3f-11d8-83a4-000a95bc6faemultiple buffer overflows in xboing

Steve Kemp reports (in a Debian bug submission):

Due to improper bounds checking it is possible for a malicious user to gain a shell with membership group 'games'. (The binary is installed setgid games).

Environmental variables are used without being bounds-checked in any way, from the source code:

highscore.c:
   /* Use the environment variable if it exists */
   if ((str = getenv("XBOING_SCORE_FILE")) != NULL)
	strcpy(filename, str);
   else
	strcpy(filename, HIGH_SCORE_FILE);

misc.c:
    if ((ptr = getenv("HOME")) != NULL)
	(void) strcpy(dest, ptr);

Neither of these checks are boundschecked, and will allow arbitary shell code to be run.


Discovery 2003-01-01
Entry 2004-03-05
Modified 2004-03-29
xboing
< 2.4_2

CVE-2004-0149
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=174924
9764