[cod] Cod WW: 1024 bytes Command Exploit

escapedturkey escapedturkey at escapedturkey.com
Sat Jan 24 21:44:30 EST 2009


True, that is a problem. On the other hand if the exploit is so bad it 
takes down servers, the developer will be more encouraged to address it. 
Tough call.

MikeTNT wrote:
> Thank you so much that you send such information in a non puplic mailing 
> list like icculus.org
> Now all admins over the world can be sure that nobody will copy your 
> string and try it out. :-(
>  
>  
> 
>     ----- Original Message -----
>     *From:* Jumping Jack Flash <mailto:jumping.cod at gmail.com>
>     *To:* cod at icculus.org <mailto:cod at icculus.org>
>     *Sent:* Saturday, January 24, 2009 9:53 PM
>     *Subject:* [cod] Cod WW: 1024 bytes Command Exploit
> 
>     Hi guys, every day my cod5 server fall down cause this
>     error: Attempted to overrun string in call to va()
> 
>     I've found some information about it:
> 
>     "va() is a function of the Quake 3 engine used to quickly build strings
>     using snprintf and a static destination buffer.
>     If the generated string is longer than the available buffer the server
>     shows an "Attempted to overrun string in call to va()" error and
>     terminates.
>     >From Call of Duty 2 (and consequently) the size of this buffer has
>     been reduced from the original 32000 bytes to only 1024 causing many
>     problems to the admins.
> 
>     So in CoD5 an attacker which has joined the server can exploit this
>     vulnerability through the sending of a command longer than 1024 bytes
>     causing the immediate termination of the server."
> 
>     I try it, and it works. I you send this command to the server, it will crash:
> 
> 
>     cmd I'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsv
> 
> 
>     I test it in differents servers, in someones worked, in other didn't... Anybody knows a solution for this exploit?
> 
>     Thank, and sorry my english :P
> 
> 
>     JuMp!nG
> 
> 



More information about the Cod mailing list