exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files

Unreal Tournament Buffer Overflow
Posted Feb 9, 2011
Authored by Fulcrum

Unreal Tournament remote buffer overflow exploit using SEH and written for Windows.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 3501ce11a58cf39d271605054c6374c1f2573ea2afe44f7646baa59a2bc5fcaa

Related Files

Unreal Tournament III Uninitialized Pointer
Posted Jul 21, 2010
Authored by Luigi Auriemma | Site aluigi.org

Unreal Tournament III suffers from an uninitialized pointer vulnerability.

tags | advisory
SHA-256 | 4f03ee16d11664440497200a3044e2b1c74ba81bb6fd7c59fec78d672f1e22b5
Secunia Security Advisory 40637
Posted Jul 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Unreal Tournament 3, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 35616f3eff85c603d29152003e36c0cc5de3193b987324d125006b3ed08d22c0
Secunia Security Advisory 31926
Posted Sep 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Unreal Tournament 3 WebAdmin, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 51f566e2933edbc26dfb5f4b1e98f1b5a42fc52117f4701fbe910179bf3e0b3a
unreal-1.3-dirtrav.txt
Posted Sep 21, 2008
Authored by Luigi Auriemma | Site aluigi.org

Unreal Tournament v1.3 (build 3601 and 3614) suffer from a directory traversal in the web interface.

tags | exploit, web
SHA-256 | 17218c9d1f467e7dd29ba5fb2bb0ee6793d87e3757a1e1aff9b2b1d9d7d13482
unrealfp.zip
Posted Sep 16, 2008
Authored by Luigi Auriemma | Site aluigi.org

Server shutdown exploit for Unreal Engine which suffers from a failed assertion vulnerability.

tags | exploit
SHA-256 | b7e7f1463c21f51de7f49c1f903f44cdd78632aa54a69a21b30c8bf88a042f62
Secunia Security Advisory 31265
Posted Jul 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported some vulnerabilities in Unreal Tournament, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 9c68b007acf3ad04d64be289a3a2b71ee5064c18b579077341c033a63a3f1683
Secunia Security Advisory 31266
Posted Jul 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Unreal Tournament 2004, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 28db399cde7935de03f4ca06245404156382e0d943ac59a2f438a5664f7db7e4
ut3mendo.zip
Posted Jul 30, 2008
Authored by Luigi Auriemma | Site aluigi.org

Denial of service exploit for Unreal Tournament III versions 1.2 and below and 1.3beta4 which suffer from NULL pointer and memory corruption vulnerabilities.

tags | exploit, denial of service, vulnerability
SHA-256 | 9acc66de76ed3304ef2520815616065828a031627c5dfc96d9c4874e6e0f37fd
ut3mendo.txt
Posted Jul 30, 2008
Authored by Luigi Auriemma | Site aluigi.org

Unreal Tournament III versions 1.2 and below and 1.3beta4 suffer from NULL pointer and memory corruption vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 3526e31350d5d8d5479d036dca7e50b47353ed881be45a1ce7c786af805ddc7b
ut2004null.zip
Posted Jul 30, 2008
Authored by Luigi Auriemma | Site aluigi.org

Unreal Tournament 2004 versions 3369 and below NULL pointer denial of service exploit.

tags | exploit, denial of service
SHA-256 | e96cb59d26a71714223ff7837668beae18ca1db12808887906bbea1eb7ef618c
ut2004null.txt
Posted Jul 30, 2008
Authored by Luigi Auriemma | Site aluigi.org

Unreal Tournament 2004 versions 3369 and below suffer from a NULL pointer vulnerability that allows for a denial of service of the UT2004 server.

tags | advisory, denial of service
SHA-256 | 418405481b6f12c4f3c389511d9e2974ce35f12a625da63404e38271cfe00a6d
unreal-DOS.rar
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Unreal tournament 2004 DoS checking tool.

tags | denial of service
SHA-256 | 51f811fb7cfa07eb5ae025a22aa0760feaa2f1db96fb71b1dce6650aee331c63
unsecure.zip
Posted Jun 22, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept denial of service exploit that makes use of a flaw in the Unreal game engine where a simple UDP packet with a long value can overwrite important memory zones. Vulnerable games include: DeusEx versions below and equal to 1.112fm, Devastation versions below and equal to 390, Mobile Forces versions below and equal to 20000, Nerf Arena Blast versions below and equal to 1.2, Postal 2 versions below and equal to 1337, Rune versions below and equal to 107, Tactical Ops versions below and equal to 3.4.0, TNN Pro Hunter, Unreal 1 versions below and equal to 226f, Unreal II XMP versions below and equal to 7710, Unreal Tournament versions below and equal to 451b, Unreal Tournament 2003 versions below and equal to 2225, Unreal Tournament 2004 versions below 3236, Wheel of Time versions below and equal to 333b, X-com Enforcer.

tags | exploit, remote, denial of service, udp, proof of concept
SHA-256 | 6c7d8ca999fd82ca534f47257a00d83b7cdf78a424a1ac8cf377fb5568c2fdf5
unrealCodeExec.txt
Posted Jun 22, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Unreal game engine has a flaw where a simple UDP packet with a long value can overwrite important memory zones and possibly allow for remote code execution. Vulnerable games include: DeusEx versions below and equal to 1.112fm, Devastation versions below and equal to 390, Mobile Forces versions below and equal to 20000, Nerf Arena Blast versions below and equal to 1.2, Postal 2 versions below and equal to 1337, Rune versions below and equal to 107, Tactical Ops versions below and equal to 3.4.0, TNN Pro Hunter, Unreal 1 versions below and equal to 226f, Unreal II XMP versions below and equal to 7710, Unreal Tournament versions below and equal to 451b, Unreal Tournament 2003 versions below and equal to 2225, Unreal Tournament 2004 versions below 3236, Wheel of Time versions below and equal to 333b, X-com Enforcer.

tags | advisory, remote, udp, code execution
SHA-256 | e57e8509f33616fa5401f768a7a4c2abfc5aab3a91844a97e7ceae234da38313
unrfs-poc.zip
Posted Mar 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote exploit for the Unreal game engine for Windows, MacOS, and Linux that makes use of a format string bug. This proof-of-concept is a proxy server able to modify the Unreal packets in real-time allowing the insertion of %n into the class names sent by the client to the server causing the remote crash. Games affected: America's Army, DeusEx, Devastation, Magic Battlegrounds, Mobile Forces, Nerf Arena Blast, Postal 2, Rainbow Six: Raven Shield, Rune, Sephiroth: 3rd episode the Crusade, Star Trek: Klingon Honor Guard, Tactical Ops, TNN Pro Hunter, Unreal 1, Unreal II XMP, Unreal Tournament, Unreal Tournament 2003, Wheel of Time, X-com Enforcer, and XIII.

tags | exploit, remote
systems | linux, windows
SHA-256 | 87f327452ec46e6b01fe3b3812aa44923bf4c03bcf59360267ddca9d1b307e79
unrealEngine.txt
Posted Mar 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Unreal game engine for Windows, MacOS, and Linux has a format string bug that allows an attacker to remotely crash or execute malicious code on the server. Games affected: America's Army, DeusEx, Devastation, Magic Battlegrounds, Mobile Forces, Nerf Arena Blast, Postal 2, Rainbow Six: Raven Shield, Rune, Sephiroth: 3rd episode the Crusade, Star Trek: Klingon Honor Guard, Tactical Ops, TNN Pro Hunter, Unreal 1, Unreal II XMP, Unreal Tournament, Unreal Tournament 2003, Wheel of Time, X-com Enforcer, and XIII.

tags | advisory
systems | linux, windows
SHA-256 | e0ba75525b76f3a8f0df41fe6ab0de28307f96f2564e4076dce7b1591c77c934
Page 1 of 1
Back1Next

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    11 Files
  • 30
    May 30th
    46 Files
  • 31
    May 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close