BZFlag NULL Byte callsign Handling Remote DoS

2005-12-25T10:18:26
ID OSVDB:22036
Type osvdb
Reporter Luigi Auriemma(aluigi@autistici.org)
Modified 2005-12-25T10:18:26

Description

Vulnerability Description

BZFlag contains a flaw that may allow a remote denial of service. The issue is triggered when the BZFlag server process is sent a callsign message which is not NULL-terminated, and will result in loss of availability of the service.

Solution Description

Upgrade to the latest version available from CVS from end of October 2005 or later, as it has been reported to fix this vulnerability. Note that this flaw was fixed in the CVS tree without a change in version number. An upgrade is required as there are no known workarounds.

Short Description

BZFlag contains a flaw that may allow a remote denial of service. The issue is triggered when the BZFlag server process is sent a callsign message which is not NULL-terminated, and will result in loss of availability of the service.

References:

Vendor URL: http://www.bzflag.org/ Security Tracker: 1015418 Secunia Advisory ID:18238 Other Advisory URL: http://aluigi.altervista.org/adv/bzflagboom-adv.txt Other Advisory URL: http://www.securiteam.com/securitynews/6I00R2AEVS.html Generic Exploit URL: http://aluigi.altervista.org/poc/bzflagboom.zip CVE-2005-4584 Bugtraq ID: 16066