First published: Wed Dec 19 2012(Updated: )
A denial of service flaw was found in the way the server component of Freeciv before 2.3.4 processed certain packets. A remote attacker could send a specially-crafted packet that, when processed would lead to memory exhaustion or excessive CPU consumption.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/freeciv | 2.6.3-1 3.0.6-1 3.1.2+ds-2 | |
Freeciv Freeciv | <2.3.4 | |
Fedora | =16 | |
Fedora | =17 | |
Fedora | =18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5645 is classified as a denial of service vulnerability that can cause memory exhaustion or excessive CPU consumption.
To fix CVE-2012-5645, upgrade Freeciv to version 2.3.4 or later, or install the patched versions available in Debian.
Freeciv versions prior to 2.3.4 are affected by CVE-2012-5645.
Yes, CVE-2012-5645 can be exploited remotely by sending specially-crafted packets to the server component of Freeciv.
The potential impacts of CVE-2012-5645 include system downtime and performance degradation due to memory exhaustion and CPU overload.