[UNIX] Game Networking Engine Format String

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.

- - - - - - - - -

Game Networking Engine Format String


<http://www.gillius.org/gne/> GNE is "an open source network library
specifically designed for games". The console output provided by the
library (gout) is affected by a format string vulnerability which can be
exploited if the main program shows the data sent by the clients on the
gout console.


Vulnerable Systems:
* GNE version 0.70

Immune Systems:
* GNE CVS version 24

The problem is caused by the absence of the format argument "%s" in both
mlprintf and mprintf.

From ConsoleStreambuf.cpp:
void goutbuf::flush_output() {
//We always have a space for the null pointer because we reserved an
//extra position when we called setp, and we do so again at the end of
//this function.
if (pptr() > pbase()) {
*pptr() = '\0';
if (x != -1) { //Do a mlprintf if a location was set.
assert(y != -1);
Console::mlprintf(x, y, pbase());
x = y = -1; //Unset last location.
} else
setp(buf, buf + OBUF_LEN - 1);


The information has been provided by <mailto:aluigi@xxxxxxxxxxxxx> Luigi
The original article can be found at:


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.