éÎÔÅÒÅÓÎÏ, Á ÍÎÏÇÏ × éÎÔÅÒÎÅÔ ÔÁËÉÈ ÉÇÒÏ×ÙÈ ÓÅÒ×ÅÒÏ×?
> ----------------------------------------------------------------------
>
> TITLE:
> Quake 3 Buffer Overflow Vulnerabilities
>
> SECUNIA ADVISORY ID:
> SA20946
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/20946/
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> DoS, System access
>
> WHERE:
> From remote
>
> SOFTWARE:
> Quake3 Engine 3.x
> http://secunia.com/product/4653/
>
> DESCRIPTION:
> RunningBon has reported two vulnerabilities in the Quake 3 Engine,
> which can be exploited by malicious people to cause a DoS (Denial of
> Service) and potentially compromise a user's system.
>
> 1) A boundary error exist in the "CG_ServerCommand()" function when
> receiving long server commands. This can be exploited to cause a
> stack-based buffer overflow via overly long server commands sent from
> the server.
>
> Successful exploitation may allow arbitrary code execution, but
> requires that the user is e.g. tricked into connecting to a malicious
> server.
>
> 2) A boundary error exists in the handling of CS_ITEMs sent from a
> server. This can be exploited to cause a stack-based buffer overflow
> by sending overly long values to the client.
>
> Successful exploitation may allow arbitrary code execution, but
> requires that the user is e.g. tricked into connecting to a malicious
> server.
>
> SOLUTION:
> Only connect to trusted servers.
>
> PROVIDED AND/OR DISCOVERED BY:
> RunningBon
>
> ORIGINAL ADVISORY:
> http://milw0rm.com/exploits/1976
> http://milw0rm.com/exploits/1977
>