header-logo
Suggest Exploit
vendor:
Half-Life
by:
SecurityFocus
7.5
CVSS
HIGH
Format String Vulnerability
134
CWE
Product Name: Half-Life
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2002

Half-Life Format String Vulnerability

It has been reported that Half-Life clients may be prone to a format string vulnerability. The problem occurs when an invalid command is issued to the server, and an error response is returned and displayed by the client. If a format specifier were included within the invalid command, when displaying the error the format specifier would be interperted literally. This could potentially be exploited by a remote attacker to execute arbitrary code with the privileges of the Half-Life client.

Mitigation:

Ensure that all user-supplied input is properly validated and sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8730/info

It has been reported that Half-Life clients may be prone to a format string vulnerability. The problem occurs when an invalid command is issued to the server, and an error response is returned and displayed by the client. If a format specifier were included within the invalid command, when displaying the error the format specifier would be interperted literally. This could potentially be exploited by a remote attacker to execute arbitrary code with the privileges of the Half-Life client. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23198.zip