Welcome!

Join our community of MMO enthusiasts and game developers! By registering, you'll gain access to discussions on the latest developments in MMO server files and collaborate with like-minded individuals. Join us today and unlock the potential of MMO server development!

Join Today!

GunZ Patch Library (27 patches and counting)

Newbie Spellweaver
Joined
Oct 14, 2011
Messages
43
Reaction score
7
Re: Patch for 14 exploits

Never knew that people would go that far,Thanks for the patches.You made the community once again happy.
 
Good Guy George
Loyal Member
Joined
Apr 12, 2009
Messages
1,260
Reaction score
239
Re: Patch for 14 exploits

Md5 exploit..
 
Praise the Sun!
Loyal Member
Joined
Dec 4, 2007
Messages
2,502
Reaction score
986
Re: Patch for 16 exploits

Added two more patches (thanks to sahar for information on those two exploits).
 
Junior Spellweaver
Joined
Feb 14, 2013
Messages
129
Reaction score
1
Re: Patch for 16 exploits

WTF 16 EXPLOITS LOL VERY NICE DDD: thanks ._.'
 
Junior Spellweaver
Joined
May 30, 2013
Messages
102
Reaction score
2
Re: Patch for 16 exploits

there is a small problem in some of the fix's because I add them all and the client connects me .. ie I put username and password and stays there nothing more connecting.
 
Praise the Sun!
Loyal Member
Joined
Dec 4, 2007
Messages
2,502
Reaction score
986
Re: Patch for 16 exploits

there is a small problem in some of the fix's because I add them all and the client connects me .. ie I put username and password and stays there nothing more connecting.

Could you replace

PHP:
                // Patch
                if (MGetBlobArraySize(pLoginParam) >= (8 + MAX_MD5LENGH)) {
                    break;
                }

With
PHP:
                // Patch
                if (MGetBlobArraySize(pLoginParam) >= (8 + MAX_MD5LENGH)) {
                    break;
                }
                
                LOG(LOG_PROG, "Dump: %i - %i\n", MGetBlobArraySize(pLoginParam), MAX_MD5LENGH);

And post the output in this thread?
 
Junior Spellweaver
Joined
Feb 14, 2013
Messages
129
Reaction score
1
Re: Patch for 16 exploits

Could you replace

PHP Code:
// Patch
if (MGetBlobArraySize(pLoginParam) >= (8 + MAX_MD5LENGH)) {
break;
}


With
PHP Code:
// Patch
if (MGetBlobArraySize(pLoginParam) >= (8 + MAX_MD5LENGH)) {
break;
}

LOG(LOG_PROG, "Dump: %i - %i\n", MGetBlobArraySize(pLoginParam), MAX_MD5LENGH);


And post the output in this thread?



HELP ME! i lay LOGIN AND PASSWORD AND NOT CONNECT TO SERVER.
 
Praise the Sun!
Loyal Member
Joined
Dec 4, 2007
Messages
2,502
Reaction score
986
Re: Patch for 16 exploits

HELP ME! i lay LOGIN AND PASSWORD AND NOT CONNECT TO SERVER.

Could you replace

PHP:
                // Patch
                if (MGetBlobArraySize(pLoginParam) >= (8 + MAX_MD5LENGH)) {
                    break;
                }

With
PHP:
                // Patch
                if (MGetBlobArraySize(pLoginParam) >= (8 + MAX_MD5LENGH)) {
                    break;
                }
                
                LOG(LOG_PROG, "Dump: %i - %i\n", MGetBlobArraySize(pLoginParam), MAX_MD5LENGH);

And post the output in this thread?

If you post the output I'll know what's causing it.
 
Junior Spellweaver
Joined
Feb 14, 2013
Messages
129
Reaction score
1
Re: Patch for 16 exploits

I did everything that u posted, 16 patch exploits did everything right, and when I go to connect to the server is loading and does not connect ....


Already took up the "MD5 =" 1 "0 LEFT AND STILL NOT CONNECTING ....


My gunz is off, rebooted to update thought it would be all right and Puft gave this error need help my server is off |: \
 
Last edited:
Praise the Sun!
Loyal Member
Joined
Dec 4, 2007
Messages
2,502
Reaction score
986
Re: Patch for 16 exploits

I did everything that u posted, 16 patch exploits did everything right, and when I go to connect to the server is loading and does not connect ....


Already took up the "MD5 =" 1 "0 LEFT AND STILL NOT CONNECTING ....


My gunz is off, rebooted to update thought it would be all right and Puft gave this error need help my server is off |: \

Like I said, post the output and I can help you out.
 
Junior Spellweaver
Joined
Feb 14, 2013
Messages
129
Reaction score
1
Re: Patch for 16 exploits

Log MatchServer :
PHP:
gameguard not running
Load XML from memory : strings.xml(0x0001) - SUCCESS
Load XML from memory : cserror.xml(0x0001) - SUCCESS
[07/24/13 14:48:02] DBMS connected

[07/24/13 14:48:02] Command registeration completed


10
MBMatchServer::AddClanServerSwitchDownSchedule - make close clan mode schedule success. next close clan mode time is 13-7-31 23:50

10
Inited client file list (1)
Start GambleItem Init.
GIID : 1000001
GIID : 1000002
GIID : 1000003
GIID : 1000004
End GambleItem Init.

Start shop GItem list log.
GambleItemCount : 2.
Shop GItem : 1000003
Shop GItem : 1000004
End shop GItem list log.


=== Dump GambleItem Info. ===
Gamble item list.
Gamble item. ID(1000001), Name(Blue Box), IsTimeover(0).
Gamble item. ID(1000002), Name(Pink Box), IsTimeover(0).
Gamble item. ID(1000003), Name(Green Box), IsTimeover(0).
Gamble item. ID(1000004), Name(Gold Box), IsTimeover(0).

Send shop gamble item list.
Shop gamble item count : 2
Shop gamble item. ID(1000003), Name(Green Box).
Shop gamble item. ID(1000004), Name(Gold Box).
=== Completed Dump GambleItem Info. ===

init GameOn success.
success init security.
FILE PATH : C:\Documents and Settings\Administrador\Desktop\Server files 1.5\MatchServer\MD5HashValue.txt
MD5 Hash Value => 01 78 4b 65 26 f7 20 10 0b fe ca c3 a2 e9 a8 5c 

================================== Server configure info ==================================
[07/24/13 14:48:02] Release Date : Jul 22 2013
[07/24/13 14:48:02] X-Trap Off
[07/24/13 14:48:02] MD5 Check Off
[07/24/13 14:48:02] Loop Log Save Off
[07/24/13 14:48:02] Server Country : US
[07/24/13 14:48:02] Command version : (58)
[07/24/13 14:48:02] Event usable state : (true)
[07/24/13 14:48:02] Load event size : (0)
[07/24/13 14:48:02] FileCRCCheckSum usable state : (false)
[07/24/13 14:48:02] FileCRC size : (1)
[07/24/13 14:48:02] Country Code Filter usalbe state : (false)
[07/24/13 14:48:02] Accept Invalied IP state : (true)
[07/24/13 14:48:02] Keeper IP : (64.31.27.178)
[07/24/13 14:48:02] Monitor IP : (127.0.0.1)
[07/24/13 14:48:02] Ticket use : 0

===========================================================================================

[07/24/13 14:48:02] Match Server Created (Port:-8900)

Dueltournament Service Open(2013-7-24 Hour14, Min48) 
Daily Survival Ranking Request [month7 day24 hour14 min48]
success to update CustomIP
[07/24/13 14:48:10] Start agent Register (CommUID 0:10) IP:64.31.27.178, TCPPort:7777, UDPPort:5100
 
[07/24/13 14:48:10] Agent Added (UID:010)
[07/24/13 14:48:10] Agent Registered (CommUID 0:10) IP:64.31.27.178, TCPPort:7777, UDPPort:5100
 
[07/24/13 14:51:02] GARBAGE SESSION CLEANING : m_This(02), ClientCount=0, SessionCount=4, AgentCount=1, CommandPool=4, objHistoryCount=4

[07/24/13 14:54:02] GARBAGE SESSION CLEANING : m_This(02), ClientCount=0, SessionCount=4, AgentCount=1, CommandPool=4, objHistoryCount=4

[07/24/13 14:57:02] GARBAGE SESSION CLEANING : m_This(02), ClientCount=0, SessionCount=6, AgentCount=1, CommandPool=4, objHistoryCount=6
 
Praise the Sun!
Loyal Member
Joined
Dec 4, 2007
Messages
2,502
Reaction score
986
Re: Patch for 16 exploits

Nevermind, first post updated. At exploit 15, replace

PHP:
                if (MGetBlobArraySize(pLoginParam) >= (8 + MAX_MD5LENGH)) {

with

PHP:
                if (MGetBlobArraySize(pLoginParam) != (8 + MAX_MD5LENGH)) {
 
Newbie Spellweaver
Joined
Jun 6, 2013
Messages
93
Reaction score
74
Re: Patch for 16 exploits

Try this condition...
Code:
MGetBlobArraySize(pLoginParam) != (8 + MAX_MD5LENGH)


Size is shouldn't be equaled (>=) because MAX_MD5LENGTH is valid size. Not tested so not sure.
 
Praise the Sun!
Loyal Member
Joined
Dec 4, 2007
Messages
2,502
Reaction score
986
Re: Patch for 16 exploits

Try this condition...
Code:
MGetBlobArraySize(pLoginParam) != (8 + MAX_MD5LENGH)


Size is shouldn't be equal'd (>=) because MAX_MD5LENGTH is valid size.

Yeah, I just realized. I was meant to check if it's larger than MAX_MD5LENGTH but I should have used '>' and not '>='. '!=' should do the job anyway.
 
Back
Top