Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 329949 (CVE-2010-2445) - <games-strategy/freeciv-2.2.1: arbitrary command execution (CVE-2010-2445)
Summary: <games-strategy/freeciv-2.2.1: arbitrary command execution (CVE-2010-2445)
Status: RESOLVED FIXED
Alias: CVE-2010-2445
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://gna.org/bugs/?15624
Whiteboard: B2 [glsa]
Keywords:
Depends on: 329957
Blocks:
  Show dependency tree
 
Reported: 2010-07-26 15:53 UTC by Stefan Behte (RETIRED)
Modified: 2014-02-06 15:00 UTC (History)
5 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2010-07-26 15:53:17 UTC
CVE-2010-2445 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2445):
  freeciv 2.2 before 2.2.1 and 2.3 before 2.3.0 allows attackers to
  read arbitrary files or execute arbitrary commands via scenario that
  contains Lua functionality, related to the (1) os, (2) io, (3)
  package, (4) dofile, (5) loadfile, (6) loadlib, (7) module, and (8)
  require modules or functions.
Comment 1 Zeev Tarantov 2010-08-02 19:47:23 UTC
games-strategy/freeciv-2.2.1 is in portage and stable for x85 and amd64. Just test & stable it for other arches.
Comment 2 Steffen Schaumburg 2010-10-31 05:40:22 UTC
The oldest 2.2 in the tree is now 2.2.1, and there's no 2.3 in the tree, so I think this can be closed.
Comment 3 Agostino Sarubbo gentoo-dev 2011-10-11 09:04:36 UTC
@security, fixed versions are in tree.

From secunia I see:

The security issue exists due to the Lua run time environment allowing access to the operating system specific modules and functions. This can be exploited to execute arbitrary shell commands via a specially crafted saved game or scenario file.

We should move it to B2? If not please proceed with glsa vote.

Thanks.
Comment 4 Tim Sammut (RETIRED) gentoo-dev 2011-10-11 22:27:14 UTC
Yes, I believe this should be B2. GLSA request filed.
Comment 5 DrSlony 2013-08-15 12:56:17 UTC
Is this still valid?
Comment 6 GLSAMaker/CVETool Bot gentoo-dev 2014-02-06 15:00:27 UTC
This issue was resolved and addressed in
 GLSA 201402-07 at http://security.gentoo.org/glsa/glsa-201402-07.xml
by GLSA coordinator Chris Reffett (creffett).