[bf1942] [BF42] EXPLOIT!

Rick Thompson fortweb at fortweb.com
Wed Feb 25 19:31:11 EST 2004


At 12:31 AM 2/26/2004 +0100, you wrote:
>  to fix this open the executable (bf42_ded.exe or bf42_lnxded_static) with
>an
>  Hexeditior an search for "00042370" then youll find: "7f" please change
>this
>  to "77".


So this only relates to the static binary? I imagine if it is true for the 
win32 and static code it also effects the dynamic version.

Your server crashing is least of your worries btw, buffer overflow exploits 
are often used to gain shell access.

Rick


-------------- next part --------------

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.591 / Virus Database: 374 - Release Date: 2/17/2004


More information about the Bf1942 mailing list