luisTJ / ghostplusplus

Automatically exported from code.google.com/p/ghostplusplus
Other
0 stars 0 forks source link

Remote Admin Exploit #93

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
What steps will reproduce the problem?
1. Unclear, for I was not the one to do this. I merely observed the 
exploitation. 

What is the expected output? What do you see instead?
Remote Administration Via (Spoofing?)

What version of the product are you using? On what operating system?
17.1
Linux vps1 2.6.18-194.8.1.el5.028stab070.5 #1 SMP Fri Sep 17 19:10:36 MSD 2010 
x86_64 GNU/Linux

Please provide any additional information below.

Hello,

Today I have observed Ghost++ (latest version ; Linux) being exploited. One of 
my bots were told to rehost as game name "proof" right after I was told that my 
bots were vulnerable.

I suggest using a passcode phrase for all remote commands in future builds to 
remove the posibility of this from ever happening again.

Thank you,
Roamer@USEast of Clan uL

Original issue reported on code.google.com by theha...@gmail.com on 24 Sep 2010 at 1:35

GoogleCodeExporter commented 9 years ago
See discussion here:
http://www.codelain.com/forum/index.php?topic=14148.0

It is already fixed, try building from the latest SVN revision.

Original comment by luq...@gmail.com on 24 Sep 2010 at 10:51