Vulnerabilities > CVE-2006-0460 - Buffer Overflow vulnerability in BomberClone Error Messages

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
bomberclone
nessus
exploit available
metasploit

Summary

Multiple buffer overflows in BomberClone before 0.11.6.2 allow remote attackers to execute arbitrary code via long error messages.

Exploit-Db

  • descriptionBomberClone < 0.11.6.2 (Error Messages) Remote Buffer Overflow Exploit. CVE-2006-0460. Remote exploits for multiple platform
    idEDB-ID:1602
    last seen2016-01-31
    modified2006-03-22
    published2006-03-22
    reporteresca zoo
    sourcehttps://www.exploit-db.com/download/1602/
    titleBomberClone < 0.11.6.2 - Error Messages Remote Buffer Overflow Exploit
  • descriptionBomberclone 0.11.6 Buffer Overflow. CVE-2006-0460. Remote exploit for windows platform
    idEDB-ID:16433
    last seen2016-02-01
    modified2010-04-30
    published2010-04-30
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16433/
    titleBomberclone 0.11.6 - Buffer Overflow

Metasploit

descriptionThis module exploits a stack buffer overflow in Bomberclone 0.11.6 for Windows. The return address is overwritten with lstrcpyA memory address, the second and third value are the destination buffer, the fourth value is the source address of our buffer in the stack. This exploit is like a return in libc. ATTENTION The shellcode is exec ONLY when someone try to close bomberclone.
idMSF:EXPLOIT/WINDOWS/MISC/BOMBERCLONE_OVERFLOW
last seen2020-06-13
modified1976-01-01
published1976-01-01
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0460
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/misc/bomberclone_overflow.rb
titleBomberclone 0.11.6 Buffer Overflow

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200602-09.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200602-09 (BomberClone: Remote execution of arbitrary code) Stefan Cornelius of the Gentoo Security team discovered multiple missing buffer checks in BomberClone
    last seen2020-06-01
    modified2020-06-02
    plugin id20935
    published2006-02-17
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20935
    titleGLSA-200602-09 : BomberClone: Remote execution of arbitrary code
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 200602-09.
    #
    # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(20935);
      script_version("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:43");
    
      script_cve_id("CVE-2006-0460");
      script_xref(name:"GLSA", value:"200602-09");
    
      script_name(english:"GLSA-200602-09 : BomberClone: Remote execution of arbitrary code");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-200602-09
    (BomberClone: Remote execution of arbitrary code)
    
        Stefan Cornelius of the Gentoo Security team discovered multiple
        missing buffer checks in BomberClone's code.
      
    Impact :
    
        By sending overly long error messages to the game via network, a
        remote attacker may exploit buffer overflows to execute arbitrary code
        with the rights of the user running BomberClone.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/200602-09"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All BomberClone users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=games-action/bomberclone-0.11.6.2-r1'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Bomberclone 0.11.6 Buffer Overflow');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:bomberclone");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/02/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/02/17");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/02/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"games-action/bomberclone", unaffected:make_list("ge 0.11.6.2-r1"), vulnerable:make_list("lt 0.11.6.2-r1"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "BomberClone");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-997.NASL
    descriptionStefan Cornelius of Gentoo Security discovered that bomberclone, a free Bomberman-like game, crashes when receiving overly long error packets, which may also allow remote attackers to execute arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id22863
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22863
    titleDebian DSA-997-1 : bomberclone - buffer overflows

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83072/bomberclone_overflow.rb.txt
idPACKETSTORM:83072
last seen2016-12-05
published2009-11-26
reporteracaro
sourcehttps://packetstormsecurity.com/files/83072/Bomberclone-0.11.6-Buffer-Overflow.html
titleBomberclone 0.11.6 Buffer Overflow

Seebug

  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:15937
    last seen2017-11-19
    modified2006-03-22
    published2006-03-22
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-15937
    titleBomberClone &lt; 0.11.6.2 (Error Messages) Remote Buffer Overflow Exploit
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:63429
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-63429
    titleBomberClone < 0.11.6.2 - (Error Messages) Remote Buffer Overflow Exploit