BDash 0.31 Buffer Overflow Vulnerability
BID:1791
Info
BDash 0.31 Buffer Overflow Vulnerability
| Bugtraq ID: | 1791 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | No |
| Local: | Yes |
| Published: | Jun 18 1997 12:00AM |
| Updated: | Jun 18 1997 12:00AM |
| Credit: | This vulnerability was reorted to bugtraq by Nicolas Dubee <mailto:[email protected]> on Wed Jun 18 1997. |
| Vulnerable: |
Nicolas Dubee B-DASH 0.31 |
| Not Vulnerable: | |
Discussion
BDash 0.31 Buffer Overflow Vulnerability
A vulnerability exists in the game B-DASH v0.31, distributed with old versions of Linux and certain non-current versions of Slackware.
Due to incorrect handling of the $HOME environment variable in calls to the vconfig() function, it is possible for users to overwrite stack variables such as the calling function's return address with arbitrary values that can alter the program's flow of execution.
If exploited, the user can at the very least cause the host to crash. More advanced attacks can result in arbitrary code execution on the victim host.
A vulnerability exists in the game B-DASH v0.31, distributed with old versions of Linux and certain non-current versions of Slackware.
Due to incorrect handling of the $HOME environment variable in calls to the vconfig() function, it is possible for users to overwrite stack variables such as the calling function's return address with arbitrary values that can alter the program's flow of execution.
If exploited, the user can at the very least cause the host to crash. More advanced attacks can result in arbitrary code execution on the victim host.
Solution / Fix
BDash 0.31 Buffer Overflow Vulnerability
Solution:
Currently the SecurityFocus staff are not ware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not ware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].