==================================================================================== # # this file has been created for the Lame patcher program available for both *nix # and Windows platforms. # You need this program for continuing the patching of your files: # # http://aluigi.org/mytoolz.htm#lpatch # # Quick step-by-step # - launch lpatch.exe # - select this lithsecfix.lpatch file # - read the message windows and click yes # - select the file (usually executables or dlls) to patch # - read the message windows to know if everything has been patched correctly # - test your game # # Quick step-by-step for Linux: # - compile lpatch: gcc -c md5.c ; gcc -o lpatch lpatch.c md5.o # - launch ./lpatch lithsecfix.lpatch # - read the text messages # - specify the name of the file to patch # - read the text messages to know if everything has been patched correctly # - test your game TITLE old Monolith games \secure\ buffer-overflow fix 0.1 by Luigi Auriemma e-mail: aluigi@autistici.org web: aluigi.org INTRO This unofficial patch is referred to the bug described here: . . http://aluigi.org/adv/lithsec-adv.txt . The following is the list of vulnerable games: . Alien versus Predator 2 <= 1.0.9.6 Blood 2 <= 2.1 No one lives forever <= 1.004 Shogo <= 2.2 . If you are unsure if your server is vulnerable please use the proof-of-concept provided there. . The patch is extremely simple, it only substituites the 's' of "secure" with a NULL byte so the vulnerable function will be not used. FYI, the \secure\ method is no longer used by Gamespy. FILE Avp2dll.rez;Blood2sv.exe;Nolfu004.rez;ShogoSrv.exe BYTES_ORIGINAL 's' 'e' 'c' 'u' 'r' 'e' 00 BYTES_PATCH 00 ====================================================================================