exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

unrealEngine.txt

unrealEngine.txt
Posted Mar 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Unreal game engine for Windows, MacOS, and Linux has a format string bug that allows an attacker to remotely crash or execute malicious code on the server. Games affected: America's Army, DeusEx, Devastation, Magic Battlegrounds, Mobile Forces, Nerf Arena Blast, Postal 2, Rainbow Six: Raven Shield, Rune, Sephiroth: 3rd episode the Crusade, Star Trek: Klingon Honor Guard, Tactical Ops, TNN Pro Hunter, Unreal 1, Unreal II XMP, Unreal Tournament, Unreal Tournament 2003, Wheel of Time, X-com Enforcer, and XIII.

tags | advisory
systems | linux, windows
SHA-256 | e0ba75525b76f3a8f0df41fe6ab0de28307f96f2564e4076dce7b1591c77c934

unrealEngine.txt

Change Mirror Download

#######################################################################

Luigi Auriemma

Application: Unreal engine
http://unreal.epicgames.com
Games: - America's Army
- DeusEx
- Devastation
- Magic Battlegrounds
- Mobile Forces
- Nerf Arena Blast
- Postal 2
- Rainbow Six: Raven Shield
- Rune
- Sephiroth: 3rd episode the Crusade
- Star Trek: Klingon Honor Guard
- Tactical Ops
- TNN Pro Hunter
- Unreal 1
- Unreal II XMP
- Unreal Tournament
- Unreal Tournament 2003
- Wheel of Time
- X-com Enforcer
- XIII
(the list contains all the Unreal based games with
multiplayer support released until now)
Platforms: Windows, Linux and MacOS
Bug: remote format string bug
Risk: critical
Exploitation: remote, versus server
Date: 10 Mar 2004
Author: Luigi Auriemma
e-mail: aluigi@altervista.org
web: http://aluigi.altervista.org


#######################################################################


1) Introduction
2) Bug
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


The Unreal engine is the famous game engine developed by EpicGames
(http://www.epicgames.com) and used by a wide number of games.


#######################################################################

======
2) Bug
======


The problem is a format string bug in the Classes management.
Each time a client connects to a server it sends the names of the
objects it uses (called classes).

If an attacker uses a class name containing format parameters (as %n,
%s and so on) he will be able to crash or also to execute malicious
code on the remote server.


#######################################################################

===========
3) The Code
===========


http://aluigi.altervista.org/poc/unrfs-poc.zip

This proof-of-concept is a proxy server able to modify the Unreal
packets in real-time allowing the insertion of "%n" into the class
names sent by the client to the server causing the remote crash.
It should be compatible with any game based on the Unreal engine and
requires the same game running on the server to be used.


#######################################################################

======
4) Fix
======


This bug was signaled to EpicGames EXACTLY the 2th September 2003
(today is the 10th March so over 6 months ago) but at the beginning it
was underrated and was taken a bit more seriously only at November.

All the developers of the vulnerable games have been alerted by
EpicGames through their internal mailing-list.


About UT and UT2003:
EpicGames refused to release a quick-fix for UnrealTournament and
UnrealTournament 2003 so the fix was inserted in the planned patch
as they do for graphic bugs and other small problems... the patch has
not been released yet and is impossible to know when it will be ready.


QUICK FIXES ARE THE SOLUTION: SECURITY BUGS ARE *NOT* COMMON BUGS!!!


#######################################################################


---
Luigi Auriemma
http://aluigi.altervista.org
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close