Gamespy 3d 2.62/2.63 – IRC Client Remote Buffer Overflow

Gamespy 3d 2.62/2.63 – IRC Client Remote Buffer Overflow

漏洞ID 1054197 漏洞类型
发布时间 2003-09-30 更新时间 2003-09-30
图片[1]-Gamespy 3d 2.62/2.63 – IRC Client Remote Buffer Overflow-安全小百科CVE编号 N/A
图片[2]-Gamespy 3d 2.62/2.63 – IRC Client Remote Buffer Overflow-安全小百科CNNVD-ID N/A
漏洞平台 Linux CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23200
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/8734/info

It has been reported that Gamespy 3D IRC client may be prone to a remote buffer overflow vulnerability due to insufficient boundary checking. The issue is reported to present itself when the client attempts to connect to a remote IRC server. During the connection process the client is reported to a send USER and NICK requests to the server. A buffer overflow condition may occur if the server responds with a request that is larger than or equal to 262 bytes.

Successful exploitation of this issue may allow an attacker to execute arbitrary code in the context of the client in order to gain unauthorized access to a vulnerable system.

Gamespy 3D versions 2.63015 and prior have been reported to be prone to this issue, however other versions may be affected as well.

You can use a text file containing a long string and launching netcat in
listening mode:

nc -l -p 6667 -v -v -n < long_string.txt

相关推荐: mime-support run-mailcap覆盖文件漏洞

mime-support run-mailcap覆盖文件漏洞 漏洞ID 1202861 漏洞类型 未知 发布时间 2003-05-12 更新时间 2003-05-12 CVE编号 CVE-2003-0214 CNNVD-ID CNNVD-200305-027 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享