header-logo
Suggest Exploit
vendor:
S.T.A.L.K.E.R Shadow of Chernobyl
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow, Integer Overflow, Denial of Service
119, 190, 400
CWE
Product Name: S.T.A.L.K.E.R Shadow of Chernobyl
Affected Version From: 1.2006
Affected Version To: 1.2006
Patch Exists: YES
Related CWE: N/A
CPE: a:gsc_game_world:stalker:shadow_of_chernobyl
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2008

S.T.A.L.K.E.R Multiple Remote Vulnerabilities

S.T.A.L.K.E.R is prone to multiple remote vulnerabilities, including a stack-based buffer-overflow vulnerability, an integer-overflow vulnerability, and a denial-of-service vulnerability. An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.

Mitigation:

Users should apply the appropriate updates to help mitigate the risk of exploitation.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/29997/info

S.T.A.L.K.E.R is prone to multiple remote vulnerabilities:

- A stack-based buffer-overflow vulnerability
- An integer-overflow vulnerability
- A denial-of-service vulnerability

An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.

S.T.A.L.K.E.R Shadow of Chernobyl 1.0006 is vulnerable; other versions may also be affected.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31998.zip