No subject


Wed Mar 11 16:46:39 EDT 2009


been reduced from the original 32000 bytes to only 1024 causing many
problems to the admins.

So in CoD5 an attacker which has joined the server can exploit this
vulnerability through the sending of a command longer than 1024 bytes
causing the immediate termination of the server."

I try it, and it works. I you send this command to the server, it will cras=
h:

cmd aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

I test it in differents servers, in someones worked, in other
didn't... Anybody knows a solution for this exploit?

Thank, and sorry my english :P

JuMp!nG

--0015174bf0f8b50ce6046140b317
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi guys, every day my cod5 server fall down cause this error:&nbsp;<span cl=
ass=3D"Apple-style-span" style=3D"font-size: 16px; white-space: pre; ">Atte=
mpted to overrun string in call to va()</span><div><span class=3D"Apple-sty=
le-span" style=3D"font-size: 16px; white-space: pre;"><br>
</span></div><div><span class=3D"Apple-style-span" style=3D"white-space: pr=
e; "><span class=3D"Apple-style-span" style=3D"font-size: small;">I&#39;ve =
found some information about it:</span></span></div><div><span class=3D"App=
le-style-span" style=3D"font-size: 16px; white-space: pre;"><span class=3D"=
Apple-style-span" style=3D"font-family: &#39;times new roman&#39;; white-sp=
ace: normal; "><pre>
<span class=3D"Apple-style-span" style=3D"font-size: small;"><span class=3D=
"Apple-style-span" style=3D"font-style: italic;">&quot;va() is a function o=
f the Quake 3 engine used to quickly build strings
using snprintf and a static destination buffer.
If the generated string is longer than the available buffer the server
shows an &quot;Attempted to overrun string in call to va()&quot; error and
terminates.


More information about the cod mailing list