The Ubisoft CoGSManager ActiveX control is prone to a remote stack-based buffer-overflow vulnerability due to a lack of proper bounds checking on user-supplied input. Attackers can exploit this vulnerability to execute arbitrary code within the context of an application, typically Internet Explorer, that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service condition.
The Uplay desktop client does not properly validate user-controlled data passed to its custom uplay URI protocol handler. This flaw can be used to exploit the Chromium Embedded Framework (CEF) integrated within the Uplay client, allowing for arbitrary code execution.
"C:Program Files (x86)UbisoftUbisoft Game Launcher" has insecure permissions that allow all BUILTIN-USER to have full permission. An attacker can replace the vulnerable executable file with a malicious file.
America's Army is prone to a remote denial-of-service vulnerability because the application fails to properly handle invalid queries. Exploiting this issue allows remote attackers to cause the application to crash, effectively denying service to legitimate users.
The vulnerability is caused due to a memset() boundary error in the processing of incoming data thru raw socket connections on TCP port 1001, which can be exploited to cause a stack based buffer overflow by sending a long string of bytes on the second connection. Successful exploitation could allow execution of arbitrary code on the affected node.
The uplay ActiveX component allows an attacker to execute any command line action. User must sign in, unless auto-sign in is enabled and uplay must not already be running. Due to the way the malicious executable is served (WebDAV), the module must be run on port 80, so please make sure you have enough privilege to do that. Ubisoft released patch 2.04 as of Mon 20th July.