---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: DropTeam Multiple Vulnerabilities SECUNIA ADVISORY ID: SA27107 VERIFY ADVISORY: http://secunia.com/advisories/27107/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote SOFTWARE: DropTeam 1.x http://secunia.com/product/15959/ DESCRIPTION: Luigi Auriemma has reported some vulnerabilities in DropTeam, which can be exploited by malicious people to disclose sensitive information or to potentially compromise a vulnerable system. 1) A format string error exists within the processing of 0x1 packets. This can potentially be exploited to execute arbitrary code by sending a packet with an id of 0x1 containing specially crafted username, password, or nickname fields. 2) A boundary error exists within the processing of 0x5c packets. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted packet with an id of 0x5c. 3) A boundary error exists within the processing of 0x18 packets. This can be exploited to cause a heap-based buffer overflow by sending a specially crafted packet with an id of 0x18, containing more than 524280 bytes of data. 4) A boundary error exists within the processing of 0x4b packets. This can be exploited to cause a heap-based buffer overflow by sending a specially crafted packet with an id of 0x4b. Successful exploitation of the vulnerabilities may allow the execution of arbitrary code. 5) The username and password for the DropTeam account are sent unencrypted when connecting to a game server. This can be exploited by a malicious server administrator to obtain the product key of the client. The vulnerabilities are reported in versions 1.3.3 and prior. Other versions may also be affected. SOLUTION: Restrict access to the affected DropTeam server. Do not connect to untrusted DropTeam game servers. The vendor will reportedly fix the vulnerabilities in the next version. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/dropteamz-adv.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------