[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050104185743.4e6bd4bf.aluigi@autistici.org>
From: aluigi at autistici.org (Luigi Auriemma)
Subject: Socket termination,
format string and XSS in Soldner Secret Wars 30830
#######################################################################
Luigi Auriemma
Application: S?LDNER - Secret Wars
http://www.secretwars.net
Versions: <= 30830
Platforms: Windows
Bugs: A] silent socket termination
B] in-game format string
C] in-game cross site scripting versus admin
Exploitation: remote, versus server (B and C are in-game bugs)
Date: 04 Jan 2005
Author: Luigi Auriemma
e-mail: aluigi@...istici.org
web: http://aluigi.altervista.org
#######################################################################
1) Introduction
2) Bugs
3) The Code
4) Fix
#######################################################################
===============
1) Introduction
===============
S?LDNER is a tactical military game developed by Wings Simulations
(http://www.wingssimulations.com) and has been released in May 2004.
#######################################################################
=======
2) Bugs
=======
----------------------------
A] silent socket termination
----------------------------
The bug happens when the server receives an UDP packet of 1401 or more
bytes causing the immediate termination of the listening thread for a
bad handling of the "message too long" socket error.
The termination of the socket is silent (no warning or messages) so
the admin cannot easily understand what is happened.
------------------------
B] in-game format string
------------------------
An attacker can crash or execute remote code on the game server simply
sending a message containing the format arguments (like the classical
%n%n%n).
--------------------------------------------
C] in-game cross site scripting versus admin
--------------------------------------------
The S?LDNER server has a nice web interface (port 7890) useful for the
remote administration of the servers.
This web interface contains also a screen (chat) in which are shown all
the server logs included the messages exchanged by the users that are
not filtered and so an attacker can execute HTML or Javascript code in
the admin's browser.
#######################################################################
===========
3) The Code
===========
A] http://aluigi.altervista.org/poc/soldnersock.zip
B] %n%n%n
C] <script>alert("hello");</script>
#######################################################################
======
4) Fix
======
No fix.
No reply from the developers.
#######################################################################
---
Luigi Auriemma
http://aluigi.altervista.org
Powered by blists - more mailing lists