Format string vulnerability in the Epic Games Unreal engine client, as used in multiple games, allows remote servers to execute arbitrary code via (1) the CLASS parameter in a DLMGR command, (2) a malformed package (PKG), and possibly (3) the LEVEL parameter in a WELCOME command.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/unrealcfs-adv.txt - Exploit | |
References | () http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0190.html - Exploit | |
References | () http://secunia.com/advisories/31854 - Vendor Advisory | |
References | () http://www.osvdb.org/48290 - | |
References | () http://www.osvdb.org/48291 - | |
References | () http://www.securityfocus.com/archive/1/496297/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/31141 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45088 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45089 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45090 - |
Information
Published : 2009-03-09 14:30
Updated : 2024-11-21 00:56
NVD link : CVE-2008-6441
Mitre link : CVE-2008-6441
CVE.ORG link : CVE-2008-6441
JSON object : View
Products Affected
epicgames
- unreal_engine
CWE
CWE-134
Use of Externally-Controlled Format String