Secunia Advisory: SA30815
Release Date: 2008-06-23
Critical: Moderately critical
Impact: DoS
System access
Where: From remote
Solution Status: Unpatched
Software: Call of Duty 4: Modern Warfare
Description:
Luigi Auriemma has reported some vulnerabilities in Call of Duty 4: Modern Warfare, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
1) A boundary error within the "callvote map" command can be exploited to cause a buffer overflow by calling the command with a long "MAP" parameter (greater than 248 bytes).
Successful exploitation may allow execution of arbitrary code.
2) An error within the "va()" function can be exploited to cause the server to terminate via an overly long command (greater than 1024 bytes).
The vulnerabilities are reported in version 1.6. Other versions may also be affected.
Solution:
Restrict access to game servers to trusted people only.
Bollettino Sicurezza
Release Date: 2008-06-23
Critical: Moderately critical
Impact: DoS
System access
Where: From remote
Solution Status: Unpatched
Software: Call of Duty 4: Modern Warfare
Description:
Luigi Auriemma has reported some vulnerabilities in Call of Duty 4: Modern Warfare, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
1) A boundary error within the "callvote map" command can be exploited to cause a buffer overflow by calling the command with a long "MAP" parameter (greater than 248 bytes).
Successful exploitation may allow execution of arbitrary code.
2) An error within the "va()" function can be exploited to cause the server to terminate via an overly long command (greater than 1024 bytes).
The vulnerabilities are reported in version 1.6. Other versions may also be affected.
Solution:
Restrict access to game servers to trusted people only.
Bollettino Sicurezza