Luigi Auriemma has reported a vulnerability in the Unreal Engine, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error within the "UGameEngine::UpdateConnectingMessage()" function, which can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into connecting to a malicious server.
Successful exploitation requires that downloads are enabled (default).
The vulnerability is reported in the following games:
* Unreal Tournament 2003
* Unreal Tournament 2004
* Postal 2
* Rainbow Six: Raven Shield
Solution: Do not connect to untrusted servers.
Provided and/or discovered by: Luigi Auriemma
Original Advisory: http://aluigi.altervista.org/adv/unrealcbof-adv.txt
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org