CellFactor Revolution缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1113601 漏洞类型 缓冲区溢出
发布时间 2007-09-10 更新时间 2009-02-05
CVE编号 CVE-2007-4838 CNNVD-ID CNNVD-200709-157
漏洞平台 Multiple CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/30574
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200709-157
|漏洞详情
CellFactor中文名为物理游戏,是一款流行的第一人称扮演游戏。CellFactor处理畸形用户请求时存在多个漏洞,远程攻击者可能利用这些漏洞控制服务器。如果远程攻击者向CellFactor发送了特制的0x21、0x22和0x23类型消息的话,就可以触发缓冲区溢出,导致在运行游戏的主机上执行任意指令。
|漏洞EXP
source: http://www.securityfocus.com/bid/25625/info

CellFactor: Revolution is prone to multiple remote code-execution vulnerabilities, including a buffer-overflow issue and a format-string issue.

Successfully exploiting these issues will allow an attacker to execute arbitrary code within the context of the affected application or to crash the application.

CellFactor: Revolution 1.03 is vulnerable; other versions may also be affected.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30574.zip
|参考资料

来源:SECUNIA
名称:26765
链接:http://secunia.com/advisories/26765
来源:OSVDB
名称:40502
链接:http://osvdb.org/40502
来源:MISC
链接:http://aluigi.org/poc/cellfucktor.zip
来源:MISC
链接:http://aluigi.altervista.org/adv/cellfucktor-adv.txt
来源:XF
名称:cellfactor-message-bo(36507)
链接:http://xforce.iss.net/xforce/xfdb/36507
来源:BID
名称:25625
链接:http://www.securityfocus.com/bid/25625
来源:VUPEN
名称:ADV-2007-3109
链接:http://www.frsirt.com/english/advisories/2007/3109
来源:SREASON
名称:3130
链接:http://securityreason.com/securityalert/3130