header-logo
Suggest Exploit
vendor:
aGSM
by:
Unknown
7.5
CVSS
HIGH
Remote Buffer Overflow
119
CWE
Product Name: aGSM
Affected Version From: aGSM version 2.35c
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:ag-sm:aGSM:2.35c
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Remote Buffer Overflow in aGSM

aGSM is prone to a remote buffer overflow vulnerability. The issue occurs in the aGSM server information parsing routines for Half-Life game servers. A malicious server can execute arbitrary code on an affected client by exploiting a lack of sufficient bounds checking on the hostname parameter in a server reply to an info request.

Mitigation:

It is recommended to update to the latest version of aGSM or apply any patches or security updates provided by the vendor.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10989/info

aGSM is reported prone to a remote buffer overflow vulnerability. The issue presents itself in the aGSM server information parsing routines for Half-Life game servers. Due to a lack of sufficient bounds checking performed on the hostname parameter in a server reply to an info request, a malicious server may execute arbitrary code on an affected client.

It should be noted that although aGSM version 2.35c is reported prone to this vulnerability, other versions might also be affected.

For the following query:
\xFF\xFF\xFF\xFFinfo\x00
The following response is sent:
\xff\xff\xff\xffA\x00AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA