exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CallOfDuty.txt

CallOfDuty.txt
Posted Sep 9, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Call of Duty versions 1.4 and below use some anti-buffer-overflow checks that automatically shutdown the game if they find a too big input. The result is that a query or a reply containing over 1024 chars is able to exploit this protection causing the immediate stop of the game.

tags | advisory, overflow
SHA-256 | 9583108fdf5efbc20a5366f2c6a5e031e725730003b709353c1d34e9997346f1

CallOfDuty.txt

Change Mirror Download

#######################################################################

Luigi Auriemma

Application: Call of Duty
http://www.callofduty.com
Versions: <= 1.4
Platforms: Windows and Linux
Bug: Denial of Service
Risk: high
Exploitation: remote, versus servers and clients (broadcast)
Date: 05 September 2004
Author: Luigi Auriemma
e-mail: aluigi@altervista.org
web: http://aluigi.altervista.org


#######################################################################


1) Introduction
2) Bug
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


Call of Duty is the famous military FPS game developed by Infinity Ward
(http://www.infinityward.com) and released in October 2003.

An interesting note is that this security bug was already known by some
people since the release of my recent Medal of Honor buffer-overflow
(17 July 2004), in fact the same proof-of-concept works perfectly with
Call of Duty too.


#######################################################################

======
2) Bug
======


The game uses some anti-buffer-overflow checks that automatically
shutdown the game if they find a too big input.

The result is that a query or a reply containing over 1024 chars is
able to exploit this protection causing the immediate stop of the game.

Both servers and clients are vulnerables and the major problem is just
for clients because a single malicious server is able to passively stop
any client in the world so nobody can play online.


#######################################################################

===========
3) The Code
===========


http://aluigi.altervista.org/poc/codboom.zip


#######################################################################

======
4) Fix
======


Only the official patch for the Linux version is available (since some
weeks) and can be downloaded here:

http://www.icculus.org/betas/cod/

The Windows patch is not available and "probably" will be released at
the end of September.

In the meantime I have written an unofficial fix just for the 1.4 Win32
version of the game and is able to patch both clients and servers
because the function is the same:

http://aluigi.altervista.org/patches/cod-14-fix.zip


#######################################################################


---
Luigi Auriemma
http://aluigi.altervista.org
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close