Multiple buffer overflows in the logging function in the Unreal engine, as used by America's Army and America's Army Special Forces 2.8.2 and earlier, when Punkbuster (PB) is enabled, allow remote attackers to cause a denial of service (daemon crash) via a long (1) PB_Y packet to the YPG server on UDP port 1716 or (2) PB_U packet to UCON on UDP port 1716, different vectors than CVE-2007-4442. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/481227/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36897 | vdb entry |
http://aluigi.org/poc/aaboompb.zip | exploit |
http://secunia.com/advisories/27015 | third party advisory vendor advisory |
http://aluigi.altervista.org/adv/aaboompb-adv.txt | exploit |
http://securityreason.com/securityalert/3193 | third party advisory |