[mohaa] MOHAA linux server with potential exploit fix.

Chris Adams chris at fragzzhost.com
Thu Jul 22 06:19:18 EDT 2004


This build seems to fix it, according to the checking tool provided by
Luigi. I had no problems running the new build - we'll roll it out to our
customers today and see if any complaints arise (they are aware of the issue
so hopefully they won't be too angry if there are any problems! :D)

Chris Adams
Fragzzhost.com

----- Original Message -----
From: "Ryan C. Gordon" <icculus at clutteredmind.org>
To: <mohaa at icculus.org>
Sent: Thursday, July 22, 2004 5:28 AM
Subject: [mohaa] MOHAA linux server with potential exploit fix.


>
> Ok, I looked into the MOHAA buffer overflow, and I _think_ that I have a
>   fix. I say "think" because I'm screwing with this from a hotel room
> over ssh and don't have a MOHAA client installed to test locally, or
> even MOHAA installed remotely to make sure the server will even start up.
>
> In short, please consider this to be an extremely unstable beta until
> proven otherwise.
>
>     http://icculus.org/betas/mohaa/mohaa-lnxded-07222004.tar.bz2
>
> Download, unpack, replace mohaa_lnxded and fgameded.so in your server
> installation.
>
> Please note that this build was built with gcc3, and will need an
> external support library. Explanation of what to do if you get an error
> about "libstdc++" or something instead of a running server is here:
>
>     https://bugzilla.icculus.org/show_bug.cgi?id=1801
>
> If someone can confirm that this build does indeed close the exploit and
> doesn't generally suck, I'll do the same for Spearhead, too.
>
> Thanks,
> --ryan.
>
>
>





More information about the Mohaa mailing list