Gamespy 3d 2.62/2.63 IRC Client Remote Buffer Overflow Vulnerability

ID EDB-ID:23200
Type exploitdb
Reporter Luigi Auriemma
Modified 2003-09-30T00:00:00


Gamespy 3d 2.62/2.63 IRC Client Remote Buffer Overflow Vulnerability. Dos exploit for linux platform


It has been reported that Gamespy 3D IRC client may be prone to a remote buffer overflow vulnerability due to insufficient boundary checking. The issue is reported to present itself when the client attempts to connect to a remote IRC server. During the connection process the client is reported to a send USER and NICK requests to the server. A buffer overflow condition may occur if the server responds with a request that is larger than or equal to 262 bytes.

Successful exploitation of this issue may allow an attacker to execute arbitrary code in the context of the client in order to gain unauthorized access to a vulnerable system.

Gamespy 3D versions 2.63015 and prior have been reported to be prone to this issue, however other versions may be affected as well.

You can use a text file containing a long string and launching netcat in
listening mode:

nc -l -p 6667 -v -v -n < long_string.txt