首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Unreal Tournament 3 2.1 'STEAMBLOB' Command Remote Denial of Service Vulnerabili
来源:aluigi.org 作者:Luigi 发布时间:2010-07-21  

#Original Advisory: http://aluigi.org/adv/ut3steamer-adv.txt
#
#######################################################################

                             Luigi Auriemma

Application:  Unreal Tournament III
              http://www.unrealtournament3.com
Versions:     <= 2.1 (aka 3809)
Platforms:    Windows (tested) and Linux
Bug:          unitialized pointer
Exploitation: remote, versus server
Date:         17 Jul 2010
Author:       Luigi Auriemma
              e-mail: aluigi@autistici.org
              web:    aluigi.org


#######################################################################


1) Introduction
2) Bug
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


Unreal Tournament III is currently the latest game (2007) of the Unreal
series created by Epic Games (http://www.epicgames.com).


#######################################################################

======
2) Bug
======


The game implements a particular command called STEAMBLOB which is
handled in any case even if Steam is not running.

This command accepts three arguments that are C, N and B and just this
last one (doesn't matter what value it has) is the cause of a problem
during the handling of some pointers that are left unitialized.
The effect is the crash of the whole server due to the access to
invalid memory or a NULL pointer.

It's enough only one UDP packet to exploit the vulnerability so there
are no limitations.


#######################################################################

===========
3) The Code
===========


http://aluigi.org/fakep/unrealfp.zip
http://www.exploit-db.com/sploits/unrealfp.zip

  unrealfp -x 2 -c "STEAMBLOB B=" SERVER PORT


#######################################################################

======
4) Fix
======


No fix.


#######################################################################


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·IE 7.0 - DoS Microsoft Clip Or
·SapGUI BI v7100.1.400.8 Heap C
·Hero DVD Buffer Overflow Explo
·libpng <= 1.4.2 Denial of Serv
·Lithtech Engine Memory Corrupt
·AIX5l with FTP-Server Remote R
·SapGUI BI v7100.1.400.8 Heap C
·Really Simple IM 1.3beta DoS P
·Imagine-cms <= 2.50 SQL Inject
·rpc.pcnfsd Remote Format Strin
·QQPlayer asx File Processing B
·GhostScript PostScript File St
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved