SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Game)  >   NetPanzer Vendors:   netpanzer.berlios.de
NetPanzer Lets Remote Users Cause the Server to Enter and Endless Loop
SecurityTracker Alert ID:  1014479
SecurityTracker URL:  http://securitytracker.com/id/1014479
CVE Reference:   CVE-2005-2295   (Links to External Site)
Updated:  Jun 24 2008
Original Entry Date:  Jul 14 2005
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): 0.8 and prior versions
Description:   Luigi Auriemma reported a vulnerability in NetPanzer. A remote user can cause denial of service conditions.

The networking software does not properly validate user-supplied data. A remote user can send a packet with a packet size parameter of 0x0000 to cause the game server to enter an endless loop.

A demonstration exploit is available at:

http://aluigi.altervista.org/poc/panzone.zip

Impact:   A remote user can cause the target game service to enter an endless loop.
Solution:   No solution was available at the time of this entry.
Vendor URL:  netpanzer.berlios.de/ (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Endless loop in NetPanzer 0.8



#######################################################################

                             Luigi Auriemma

Application:  NetPanzer
              http://netpanzer.berlios.de
Versions:     <= 0.8
Platforms:    Windows, Linux and Mac
Bugs:         endless loop
Exploitation: remote, versus server (and clients also if useless)
Date:         13 Jul 2005
Author:       Luigi Auriemma
              e-mail: aluigi@autistici.org
              web:    http://aluigi.altervista.org


#######################################################################


1) Introduction
2) Bug
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


NetPanzer is an open source multiplayer tactical game enough known and
played.


#######################################################################

======
2) Bug
======


The network code doesn't verify the correctness of the 16 bit number
containing the size of the entire data block received from the network.
If an attacker sends the number 0x0000 (the minimum should be 0x0002)
the game enters in an endless loop and nobody can play.


#######################################################################

===========
3) The Code
===========


http://aluigi.altervista.org/poc/panzone.zip


#######################################################################

======
4) Fix
======


The SVN version of the game has been fixed:

  http://developer.berlios.de/svn/?group_id=1250


#######################################################################


--- 
Luigi Auriemma 
http://aluigi.altervista.org 
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC