Star Wars Jedi Knight: Jedi Academy Buffer Overflow Vulnerability

BID:12977

Info

Star Wars Jedi Knight: Jedi Academy Buffer Overflow Vulnerability

Bugtraq ID: 12977
Class: Boundary Condition Error
CVE: CVE-2005-0984
Remote: Yes
Local: No
Published: Apr 02 2005 12:00AM
Updated: Jul 12 2009 11:56AM
Credit: Discovered by Luigi Auriemma <aluigi@..>.
Vulnerable: LucasArts Star Wars Jedi Knight: Jedi Academy 1.0.11
Not Vulnerable:

Discussion

Star Wars Jedi Knight: Jedi Academy Buffer Overflow Vulnerability

A buffer overflow is present in Jedi Academy that can be exploited remotely by client systems. The overflow is due to the use of the sprintf() function in a text visualization procedure, G_Printf(). The attacker can exploit this vulnerability to execute arbitrary code on the server.

Exploit / POC

Star Wars Jedi Knight: Jedi Academy Buffer Overflow Vulnerability

The advisory describing this vulnerability published by Luigi Auriemma outlined the following steps for exploitation:

- download the following file:
jamsgbof.cfg
- place it in the base folder of the game: GameData\base
- start a client and a server
- join the server
- go into the client console (shift + ~)
- type: /exec jamsgbof
- the server will crash with the return address overwritten with
0x61616161

Solution / Fix

Star Wars Jedi Knight: Jedi Academy Buffer Overflow Vulnerability

Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.

References

Star Wars Jedi Knight: Jedi Academy Buffer Overflow Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report