Exploit id Software id Tech 4 Engine - 'idGameLocal::GetGameStateObject()' Remote Code Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
34178
Проверка EDB
  1. Пройдено
Автор
LUIGI AURIEMMA
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
N/A
Дата публикации
2010-07-21
id Software id Tech 4 Engine - 'idGameLocal::GetGameStateObject()' Remote Code Execution
Код:
source: https://www.securityfocus.com/bid/41001/info

id Tech 4 Engine is prone to a remote code-execution vulnerability.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

The following applications include the vulnerable engine:

Enemy Territory: Quake Wars 1.5.12642.33243 and prior
Wolfenstein 1.3.344272 and prior
Quake 4 1.4.2 and prior
Doom 3 1.3.1 and prior
Prey 1.4 and prior 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34178.zip
 
Источник
www.exploit-db.com

Похожие темы