[17409] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Half Life dedicated server Patch

daemon@ATHENA.MIT.EDU (Thiago Zaninotti)
Mon Oct 30 01:52:12 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.20.0010291612470.15740-100000@unreal.sekure.org>
Date:         Sun, 29 Oct 2000 16:30:28 -0200
Reply-To: Thiago Zaninotti <condor@SEKURE.ORG>
From: Thiago Zaninotti <condor@SEKURE.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Just for your information,

I've tested the patched version of HLDS and it doesn't seem to be
vulnerable to the format string error found in rcon command.

Bad Rcon from 127.0.0.1:2020:
rcon %p%p%p%p

- -condor
Thiago Zaninotti
PK available through mail.

Tamandua Sekure Labs - Brazil
http://tamandua.sekure.org
mailto:labs@sekure.org

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5/Gxsf/woA9GCB6cRApBRAKDKyI+L9usDnRcySDnXXZhNedpZ1wCg29Rg
v90No5CPgrR2pr7ZsLrsASI=
=7X+a
-----END PGP SIGNATURE-----


> Someone pointed me to an announcement of a new Half Life patch which
> should be released next week and should fix the vulnerability described
> at http://www.securityfocus.com/bid/1799
>
> New features and fixes include:
> - Linux security issue resolved. <---------------------

  The patch was released earlier today. The linuxreadme.txt file
included in the release noted this as the only security related change:

- Rcon buffer overflow fixed.

It does not make any mention of the format string bug as mentioned in
'Tamandua Sekure Labs Security Advisory 2000-01'

home help back first fref pref prev next nref lref last post