[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050104185743.4e6bd4bf.aluigi@autistici.org>
Date: Tue, 4 Jan 2005 18:57:43 +0000
From: Luigi Auriemma <aluigi@...istici.org>
To: bugtraq@...urityfocus.com, bugs@...uritytracker.com,
news@...uriteam.com, full-disclosure@...ts.netsys.com,
vuln@...unia.com
Subject: Socket termination, format string and XSS in Soldner Secret Wars
30830
#######################################################################
Luigi Auriemma
Application: SÖLDNER - Secret Wars
http://www.secretwars.net
Versions: <= 30830
Platforms: Windows
Bugs: A] silent socket termination
B] in-game format string
C] in-game cross site scripting versus admin
Exploitation: remote, versus server (B and C are in-game bugs)
Date: 04 Jan 2005
Author: Luigi Auriemma
e-mail: aluigi@...istici.org
web: http://aluigi.altervista.org
#######################################################################
1) Introduction
2) Bugs
3) The Code
4) Fix
#######################################################################
===============
1) Introduction
===============
SÖLDNER is a tactical military game developed by Wings Simulations
(http://www.wingssimulations.com) and has been released in May 2004.
#######################################################################
=======
2) Bugs
=======
----------------------------
A] silent socket termination
----------------------------
The bug happens when the server receives an UDP packet of 1401 or more
bytes causing the immediate termination of the listening thread for a
bad handling of the "message too long" socket error.
The termination of the socket is silent (no warning or messages) so
the admin cannot easily understand what is happened.
------------------------
B] in-game format string
------------------------
An attacker can crash or execute remote code on the game server simply
sending a message containing the format arguments (like the classical
%n%n%n).
--------------------------------------------
C] in-game cross site scripting versus admin
--------------------------------------------
The SÖLDNER server has a nice web interface (port 7890) useful for the
remote administration of the servers.
This web interface contains also a screen (chat) in which are shown all
the server logs included the messages exchanged by the users that are
not filtered and so an attacker can execute HTML or Javascript code in
the admin's browser.
#######################################################################
===========
3) The Code
===========
A] http://aluigi.altervista.org/poc/soldnersock.zip
B] %n%n%n
C] <script>alert("hello");</script>
#######################################################################
======
4) Fix
======
No fix.
No reply from the developers.
#######################################################################
---
Luigi Auriemma
http://aluigi.altervista.org
Powered by blists - more mailing lists