vendor:
Unreal Tournament 2004
by:
onetwo
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Unreal Tournament 2004
Affected Version From: UT2004 Linux Build 3120
Affected Version To: UT2004 Linux Build 3186
Patch Exists: NO
Related CWE: CVE-2004-0608
CPE: N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=14547, https://www.infosecmatter.com/nessus-plugin-library/?id=12285, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/games/ut2004_secure, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/games/ut2004_secure, https://www.infosecmatter.com/list-of-metasploit-linux-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2004
Unreal Tournament 2004 “secure” Overflow (Linux)
This is an exploit for the GameSpy secure query in the Unreal Engine. This exploit only requires one UDP packet, which can be both spoofed and sent to a broadcast address. Usually, the GameSpy query server listens on port 7787, but you can manually specify the port as well. The RunServer.sh script will automatically restart the server upon a crash, giving us the ability to bruteforce the service and exploit it multiple times.
Mitigation:
No known mitigation or remediation for this vulnerability