DOWNLOAD ->jk3saybof.c<- HEREor view source on this pastebin:
http://pastebin.com/m6d43f37cThis program makes a script that can be executed
from the client game console that will give the server
a too big string throug the /say command and the stack buffer
overflows, and the return adress is overwritten to point at an instruction
that jumps to rhe start of the local buffer we just overflowed,
witch has been filled with user specified shellcode in raw binary format.
Check
http://aluigi.org/adv/jamsgbof-adv.txt for info about this voulnerability
If the words above made little sense to you i advise you not to try this.
For the average joe server admin: This exploit can, and most likely will grant evil-doers controll over the computer that the jk3 server runs on, be warned. Luckily it wont work if it's patched against the /say aaaaaaaaaaaaaaa crash