Format string vulnerability in the Epic Games Unreal engine client, as used in multiple games, allows remote servers to execute arbitrary code via (1) the CLASS parameter in a DLMGR command, (2) a malformed package (PKG), and possibly (3) the LEVEL parameter in a WELCOME command.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.osvdb.org/48291 | vdb entry |
http://www.securityfocus.com/archive/1/496297/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/31141 | vdb entry exploit |
http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0190.html | mailing list exploit |
http://www.osvdb.org/48290 | vdb entry |
http://secunia.com/advisories/31854 | third party advisory vendor advisory |
http://aluigi.altervista.org/adv/unrealcfs-adv.txt | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45088 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45089 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45090 | vdb entry |