Jump to content
Sign in to follow this  
V3ct0r

[!] Fixing chat vulnerability in GameServer.exe 1.38

Recommended Posts

[!] Fixing chat vulnerability in GameServer.exe 1.38

 

The vulnerability:

If a player writes a string to the local chat, the GameServer.exe, on which the player’s character is located, will close:

ABCDEFGHIKLMNOPQRSTVXYZ

 

A fix:

1. Open GameServer.exe in any HEX-editor, for example, HxD;

2. Find a sequence of bytes:

50 E9 74 02 00 00 50 6A 01 6A 04 8B 4D EC

v1.png

 

3. Replace the sequence to another one:

50 68 FF C9 9A 3B 50 6A 01 6A 04 8B 4D EC

v2.png

 

4. Save changes;

5. Check that GameServer.exe is working and the vulnerability has disappeared:

v3.png

  • Like 2

Share this post


Link to post
Share on other sites

was problem i see many have is with stall clone or dupe?

also a gameserver crash from exploit is this exploit this problem?

Share this post


Link to post
Share on other sites
On 5/7/2019 at 11:11 PM, wizel1 said:

also a gameserver crash from exploit is this exploit this problem?

No, probably it is caused by buffer overflow in SystemNotice(), PopupNotice(), BickerNotice() and PlayerNotice() functions.

 

CCharacterSystemNotice.png

 

They use unsafe vsprintf() function.


Share this post


Link to post
Share on other sites
On 10/18/2020 at 5:33 AM, jianjian said:

Are there any bugs in version 2.4?

No, there is no such a vulnerability in 2.x versions.


Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

×
×
  • Create New...