The do_gameinfo function in BomberClone 0.11.6 and earlier, and possibly other functions, does not reset the packet data size, which causes the send_pkg function (packets.c) to use this data size when sending a reply, and allows remote attackers to read portions of server memory.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/28092 | vdb entry |
http://secunia.com/advisories/21303 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/19255 | vdb entry exploit |
http://www.debian.org/security/2006/dsa-1180 | vendor advisory |
http://aluigi.org/poc/bcloneboom.zip | exploit |
http://aluigi.altervista.org/adv/bcloneboom-adv.txt | exploit vendor advisory |
http://www.vupen.com/english/advisories/2006/3067 | vdb entry vendor advisory |
http://www.osvdb.org/27648 | vdb entry |
http://secunia.com/advisories/21985 | third party advisory vendor advisory |