SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Game)  >   monop Vendors:   University of California, Regents of
'monop' Player Name Buffer Overflow Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1007569
SecurityTracker URL:  http://securitytracker.com/id/1007569
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Aug 26 2003
Impact:   Execution of arbitrary code via local system, User access via local system
Exploit Included:  Yes  

Description:   A buffer overflow vulnerability was reported in the 'monop' multi-user game (part of the bsd-games package). A local user can gain elevated privileges.

^sq reported on Packetstorm that there is a buffer overflow in the processing of the player's name value. A local user can reportedly exploit this flaw to gain the privileges of the second game user.

A demonstration exploit is available at:

http://www.u-n-f.com/releases/Exploits/monosex.c

Impact:   A local user can gain the privileges of another game user.
Solution:   No solution was available at the time of this entry.
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC