aGSM远程缓冲区溢出漏洞

aGSM远程缓冲区溢出漏洞

漏洞ID 1108127 漏洞类型 边界条件错误
发布时间 2004-08-20 更新时间 2005-10-20
图片[1]-aGSM远程缓冲区溢出漏洞-安全小百科CVE编号 CVE-2004-2277
图片[2]-aGSM远程缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200412-976
漏洞平台 Multiple CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/24388
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-976
|漏洞详情
aGSM是游戏服务器监视程序,可快速找寻和监视游戏服务器状态。aGSM不正确验证半条命服务程序的应答,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击。远程半条命服务器可以构建特殊应答,造成aGSM缓冲区溢出,精心构建应答数据可能以进程权限在系统上执行任意指令。
|漏洞EXP
source: http://www.securityfocus.com/bid/10989/info

aGSM is reported prone to a remote buffer overflow vulnerability. The issue presents itself in the aGSM server information parsing routines for Half-Life game servers. Due to a lack of sufficient bounds checking performed on the hostname parameter in a server reply to an info request, a malicious server may execute arbitrary code on an affected client.

It should be noted that although aGSM version 2.35c is reported prone to this vulnerability, other versions might also be affected.

For the following query:
xFFxFFxFFxFFinfox00
The following response is sent:
xffxffxffxffAx00AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|参考资料

来源:XF
名称:agsm-response-bo(17046)
链接:http://xforce.iss.net/xforce/xfdb/17046
来源:BID
名称:10989
链接:http://www.securityfocus.com/bid/10989
来源:www.security.nnov.ru
链接:http://www.security.nnov.ru/docs6620.html
来源:OSVDB
名称:9072
链接:http://www.osvdb.org/9072
来源:SECTRACK
名称:1010989
链接:http://securitytracker.com/id?1010989
来源:SECUNIA
名称:12334
链接:http://secunia.com/advisories/12334
来源:NSFOCUS
名称:6829
链接:http://www.nsfocus.net/vulndb/6829

相关推荐: YABB跨站脚本执行漏洞

YABB跨站脚本执行漏洞 漏洞ID 1106570 漏洞类型 未知 发布时间 2002-01-09 更新时间 2005-05-02 CVE编号 CVE-2002-0117 CNNVD-ID CNNVD-200203-090 漏洞平台 CGI CVSS评分 7.…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享