exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

idefense.abuse.txt

idefense.abuse.txt
Posted Nov 2, 2002
Authored by David Endler | Site idefense.com

iDEFENSE Security Advisory 11.01.02 - Abuse is a popular side-scrolling video game that has a locally exploitable parsing error in the -net command line option allowing an attackers to gain root privileges.

tags | advisory, root
SHA-256 | b221fec3e71a23d7a3b9bd708f91010df4c7db23390ea1a2908cf7f76dfeb888

idefense.abuse.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDEFENSE Security Advisory 11.01.02:
http://www.idefense.com/advisory/11.01.02.txt
Buffer Overflow Vulnerability in Abuse
October 31, 2002

I. BACKGROUND

Abuse is a popular side-scrolling video game. More information can be
found at http://jonathanclark.com/ and http://www.crack.com/.

II. DESCRIPTION

Exploitation of a locally exploitable parsing error in Abuse's "-net"
command line option could allow attackers to gain root privileges on
a targeted system. By supplying an overly long argument, the
instruction pointer is overwritten, thereby allowing an attacker to
seize control of the executable. In a default abuse installation in
Debian Linux, both abuse.console and abuse.x11R6 can be used in
exploitation; both files are set group id games, and abuse.console is
set user id root.

III. ANALYSIS

Exploitation allows a local attacker to gain super-user status and
full control over the targeted system. Affected users should
implement either of the two workarounds listed below.

IV. DETECTION

Abuse 2.00, which is packaged and distributed with the x86
architecture of Debian Linux 3.0r0, is vulnerable. Other platforms
and architectures may be vulnerable as well. To determine if a
specific Abuse implementation is vulnerable, launch it with the
following command line:

$ /usr/lib/games/abuse/abuse.console -net 'perl -e 'print "A"x500''

If the application crashes with a "Segmentation fault", it is
vulnerable.

V. WORKAROUND

Customers should consider implementing one of the two following
workarounds:

1. Remove Abuse by issuing the following command:

# apt-get remove abuse

2. Remove the setuid bit from the XaoS binary by executing the
following command:

# chmod -s /usr/lib/games/abuse/abuse.*

VI. VENDOR RESPONSE

"Abuse has a number of other vulnerabilities and should never be
installed on a multi-user system where security is a concern," said
Jonathan Clark.

"Abuse allows alternate Lisp script files to be executed at startup
via command line parameters. Some script functions can execute
abritrary commands or cause external files to modified."

VII. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
assigned the identification number CAN-2002-1250 to this issue.

VIII. DISCLOSURE TIMELINE

10/15/2002 Issue disclosed to iDEFENSE
10/31/2002 Author notified
10/31/2002 iDEFENSE clients notified
11/01/2002 Response received from Jonathan Clark
(jc@jonathanclark.com)
11/01/2002 Public disclosure

IX. CREDIT

Texonet (http://www.texonet.com) discovered this vulnerability.


Get paid for security research
http://www.idefense.com/contributor.html

Subscribe to iDEFENSE Advisories:
send email to listserv@idefense.com, subject line: "subscribe"


About iDEFENSE:

iDEFENSE is a global security intelligence company that proactively
monitors sources throughout the world — from technical
vulnerabilities and hacker profiling to the global spread of viruses
and other malicious code. Our security intelligence services provide
decision-makers, frontline security professionals and network
administrators with timely access to actionable intelligence
and decision support on cyber-related threats. For more information,
visit http://www.idefense.com.


- -dave

David Endler, CISSP
Director, Technical Intelligence
iDEFENSE, Inc.
14151 Newbrook Drive
Suite 100
Chantilly, VA 20151
voice: 703-344-2632
fax: 703-961-1071

dendler@idefense.com
www.idefense.com

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1.2
Comment: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x4B0ACC2A

iQA/AwUBPcLJckrdNYRLCswqEQKiIwCfYNMqgc3cz0u47KI072fQTtGqTN4An064
DlkW88VtmsQ+ZCyPWhAWnRms
=tjox
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close