lfnetwork.com mark read register faq members calendar

Thread: JA buffer overflow exploit
Thread Tools Display Modes
Post a new thread. Add a reply to this thread. Indicate all threads in this forum as read. Subscribe to this forum. RSS feed: this forum RSS feed: all forums
Old 04-12-2005, 02:13 AM   #1
ASk
No purchase necessary!
 
ASk's Avatar
 
Join Date: Mar 2002
Location: Israel
Posts: 525
JA buffer overflow exploit

There's a buffer overflow in G_Printf [local buffer of 1024 bytes, which can be overflowed] that allows a person to execute arbitrary shellcode, and/or crash the server
Exploitable by any person connected to a server and having access to /say or /tell

Perhaps that should be fixed.

ASk is offline   you may: quote & reply,
Old 04-12-2005, 02:44 AM   #2
Tinny
 
Tinny's Avatar
 
Join Date: Apr 2002
Posts: 1,188
I think Slider has an external patch of this or something in his newest release of JA+.


Redeemed!

An old school mod for jedi academy.
Tinny is offline   you may: quote & reply,
Old 04-24-2005, 04:35 AM   #3
stubert
 
Join Date: Aug 2002
Location: Philadelphia
Posts: 227
are you really worried about the JK gaming community knowing what an exploit is?
stubert is offline   you may: quote & reply,
Old 05-05-2005, 06:43 PM   #4
Wudan
Got Balance?
 
Wudan's Avatar
 
Join Date: Oct 2002
Location: Salt Lake, UT
Posts: 1,442
It's not the people who don't know what an exploit is he's worried about, it's the people who do. This is a significant problem, and there are more than enough linux hosts who should be worried about this.


Mt-Wudan.com
I made a silly little program called Dragon, which is an animation tool for the GLA format, used in Jedi Outcast, Jedi Academy and Krakatoa.
Wudan is offline   you may: quote & reply,
Old 05-21-2005, 03:23 AM   #5
ensiform
The Stig
 
ensiform's Avatar
 
Join Date: Nov 2004
Location: Sawtooth Cauldron
Posts: 1,241
Current Game: Borderlands 2
For g_syscalls.c


Code:
void trap_SendServerCommand( int clientNum, const char *text ) {
	// CHRUKER: b001 - Oversize server commands
	// rain - hack - commands over 1022 chars will crash the
	// client upon receipt, so ignore them
	if( strlen( text ) > 1022 ) {
		G_LogPrintf( "trap_SendServerCommand( %d, ... ) length exceeds 1022.\n", clientNum );
		G_LogPrintf( "text [%s]\n", text );
		// -- reyalP G_LogPrintf is limited to 1024, so the above will be truncated and
		// next log message will be on the same line
		G_LogPrintf( "]... truncated\n", text );
		return;
	}
	syscall( G_SEND_SERVER_COMMAND, clientNum, text );
}


iojamp project lead / coder
ensiform is offline   you may: quote & reply,
Old 05-21-2005, 11:21 AM   #6
Tinny
 
Tinny's Avatar
 
Join Date: Apr 2002
Posts: 1,188
Thanks Ensi.


Redeemed!

An old school mod for jedi academy.
Tinny is offline   you may: quote & reply,
Old 05-25-2005, 10:17 PM   #7
razorace
Impressive, Terran!
 
razorace's Avatar
 
Join Date: May 2002
Posts: 9,187
Thanks for the heads up guys.


---Jedi Guardian of the Newbie Questions
---Masters of the Force Team Leader / Creator
---Open Jedi Project Lead Moderator / Co-Founder
razorace is offline   you may: quote & reply,
Post a new thread. Add a reply to this thread. Indicate all threads in this forum as read. Subscribe to this forum. RSS feed: this forum RSS feed: all forums
Go Back   LucasForums > Network > JediKnight Series > Editing Central > JA Coding > JA buffer overflow exploit

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Forum Jump


All times are GMT -4. The time now is 12:21 AM.

LFNetwork, LLC ©2002-2011 - All rights reserved.
Powered by vBulletin®
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.