[bf1942] [BF42] EXPLOIT!
Rick Thompson
fortweb at fortweb.com
Wed Feb 25 19:31:11 EST 2004
At 12:31 AM 2/26/2004 +0100, you wrote:
> to fix this open the executable (bf42_ded.exe or bf42_lnxded_static) with
>an
> Hexeditior an search for "00042370" then youll find: "7f" please change
>this
> to "77".
So this only relates to the static binary? I imagine if it is true for the
win32 and static code it also effects the dynamic version.
Your server crashing is least of your worries btw, buffer overflow exploits
are often used to gain shell access.
Rick
-------------- next part --------------
---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.591 / Virus Database: 374 - Release Date: 2/17/2004
More information about the Bf1942
mailing list