Author Topic: JKA Vulnerability  (Read 1392 times)

Offline *<JO>*Angel

  • Inactive Padawan Learner
  • Outer-Rim Citizen
  • *
  • Posts: 677
  • I'll follow you until you love me.
JKA Vulnerability
« on: June 11, 2007, 05:03 PM »


Chrono, get those people to get the newest JKA patch. Some versions are vulnerable for a 255 buffer overflow. Will stop the crashing.
« Last Edit: June 12, 2007, 01:54 PM by Karmah Valentine »

Offline *<JO>*Kaeawc Farore

  • Ghost
  • Jedi Order Resident
  • *
  • Posts: 3,596
  • Gender: Male
    • Jason Pearson - Portfolio
JKA Vulnerability
« Reply #1 on: June 11, 2007, 06:36 PM »
Now you don't have to be sorry since your post is no longer in Recruiting.

-- Kaeawc Farore
Jedi Knight of the Order
Datacron Slicer

Offline Jorka Sho'Hen

  • JO Friend
  • Coruscant Citizen
  • Posts: 2,821
  • Gender: Male
Re: JKA Vulnerability
« Reply #2 on: June 12, 2007, 12:02 AM »
Yeah you need patch.

Offline *<JO>*Angel

  • Inactive Padawan Learner
  • Outer-Rim Citizen
  • *
  • Posts: 677
  • I'll follow you until you love me.
Re: JKA Vulnerability
« Reply #3 on: June 12, 2007, 12:11 AM »
The game is affected by a buffer-overflow in the visualization function
called G_Printf().
This function uses a sprintf() with a local buffer of 1024 bytes where
it stores the text to display in the console so if an attacker sends a
big message (through the commands say and tell for example) the server
calls G_Printf() for visualizing a string like the following example:
"  say: NICKNAME: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa...aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\n\n\n\naaaaaaaaaa\n\n"."
The result is that an attacker could execute malicious code on the
victim server.
The only limitation is that this is an in-game bug so the attacker must
have access to the server.


- download my patcher for the Call of Duty buffer-overrun bug:

  http://aluigi.org/patches/codmsgfix.lpatch

- open the following file contained in your Jedi Academy folder with a
  ZIP program (like Winzip for example):

  GameData\base\assets3.pk3

  note that the number of the assets file can change if you have other
  versions of the game, in any case get the file with the higher
  number available.

- extract the file jampgamex86.dll

- launch codmsgfix.lpatch with lpatch.exe (you can find all the
  instructions within the codmsgfix.lpatch file which is a normal text
  file)

- select the dll file you have just extracted, you will receive a
  success message

- create a zip file containing only the patched jampgamex86.dll file.
  the name of the zip must be assets4.pk3 (note the number 4 while the
  other zip was 3) and must be placed in the same folder where is
  located assets3.pk3.

- your server is patched and will no longer crash (or worst since this
  is a buffer-overflow bug).

Offline *<JO>*Narretas

  • Grand Councillor
  • Jedi Order Resident
  • *
  • Posts: 5,233
  • Gender: Male
  • Long live the Jedi Order
Re: JKA Vulnerability
« Reply #4 on: June 12, 2007, 10:55 AM »
woow. did you make that up on your one ???

Ek

Offline *<JO>*Angel

  • Inactive Padawan Learner
  • Outer-Rim Citizen
  • *
  • Posts: 677
  • I'll follow you until you love me.
Re: JKA Vulnerability
« Reply #5 on: June 12, 2007, 01:54 PM »
Nope, credits to go Luigi Aridemma, for the exploit, and fix:)
People learned it by finding it on the internet.. It's a original crash in most games. The jamsgbof (1024) bytes exploit works for all QUAKE engines, (jk2, jk3, sof 1&2, quake, enemy territory, unreal tournament (works differently but same buffer overflow, just other context ..) ,, Mostly all old games of Raven softwares. :)