1 results (0.002 seconds)

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 3

Format string vulnerability in the Epic Games Unreal engine client, as used in multiple games, allows remote servers to execute arbitrary code via (1) the CLASS parameter in a DLMGR command, (2) a malformed package (PKG), and possibly (3) the LEVEL parameter in a WELCOME command. Una vulnerabilidad de formato de cadena en el motor del cliente de Epic Games Unreal, cuando se utiliza en múltiples juegos, permite a servidores remotos ejecutar código arbitrariamente a través de (1) el parámetro "CLASS" en el comando DLMGR, (2) un paquete malformado (PKG), y posiblemente (3) el parámetro "LEVEL" en el comando WELCOME. • http://aluigi.altervista.org/adv/unrealcfs-adv.txt http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0190.html http://secunia.com/advisories/31854 http://www.osvdb.org/48290 http://www.osvdb.org/48291 http://www.securityfocus.com/archive/1/496297/100/0/threaded http://www.securityfocus.com/bid/31141 https://exchange.xforce.ibmcloud.com/vulnerabilities/45088 https://exchange.xforce.ibmcloud.com/vulnerabilities/45089 https://exchange.xforce.ibmcloud.com/vulnerabilities/45090 • CWE-134: Use of Externally-Controlled Format String •