Exploitable ET-bug

lo :)

As heise online (www.heise.de/newsticker/meldung/72780 - german) reports, an exploitable bug (buffer overflow) has been found in the quake3-engine. Futher, a proof-of-concept exploit has been developped demonstrating the possibility to run arbitrary code on the client.
This exploit is triggered by a client connecting to a prepared gameserver and opens a remote shell on the client listening at port 27960. At the moment the exploit only targets linux systems, but a windows version is only a matter of time and someone coding it, so watch out to what servers u connect to.

all versions of ET are vulnerable
Comments
0
Back to top