multiple security vulnerabilities

Bug #970819 reported by Simon McVittie
262
This bug affects 2 people
Affects Status Importance Assigned to Milestone
tremulous (Ubuntu)
Confirmed
Undecided
Unassigned

Bug Description

Please consider syncing tremulous/1.1.0-8 from Debian unstable into all supported Ubuntu versions. It fixes:

     - CVE-2006-2082: arbitrary file download from server by a malicious client
       (Closes: #660831)

     - CVE-2006-2236 ("the remapShader exploit"): missing bounds-checking on
       COM_StripExtension, exploitable in clients of a malicious server
       (Closes: #660827)

     - CVE-2006-2875 ("q3cbof"): buffer overflow in CL_ParseDownload by a
       malicious server (Closes: #660830)

     - CVE-2006-3324: arbitrary file overwriting in clients of a malicious
       server (Closes: #660832)

     - CVE-2006-3325: arbitrary cvar overwriting (could lead to arbitrary
       code execution) in clients of a malicious server (Closes: #660834)

     - CVE-2011-3012, CVE-2011-2764: DLL overwriting (leading to arbitrary
       code execution) in clients of a malicious server if auto-downloading
       is enabled (Closes: #660836)

     - a potential buffer overflow in error
       handling (not known to be exploitable, but it can't hurt)

     - non-literal format strings (again, none are known to be exploitable)

     - CVE-2010-5077, use of Tremulous servers by third parties to perform
       reflected DoS attacks

It also disables auto-downloading to mitigate any future security vulnerabilities.

Simon McVittie (smcv)
visibility: private → public
Revision history for this message
Tyler Hicks (tyhicks) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

Changed in tremulous (Ubuntu):
status: New → Confirmed
Revision history for this message
Simon McVittie (smcv) wrote :

> Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest posting a debdiff for this issue.

I am not an Ubuntu user (I reported this bug after fixing these vulnerabilities in Debian, to be helpful to our downstream distribution), so I'm afraid I'm not going to take on Ubuntu package maintenance.

I asked for a new maintainer for Tremulous in Debian, and nobody volunteered, so I have now arranged for Tremulous to be removed from Debian testing/unstable. As a result, it will not be in Debian 7.0, unless someone re-uploads it within the next 2-4 weeks and takes responsibility for it.

If nobody from the Ubuntu community intends to take responsibility for securing the Tremulous packages, I would recommend removing these packages from Ubuntu as well.

To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.