A vulnerability has been identified in GameSpy Arcade, which can be exploited by malicious people to write files to an arbitrary location on a user's system.
The vulnerability is caused due to an input validation error in the game update agent ("GSAPAK.EXE") when handling ".APK" files (basically a normal ZIP file). This can be exploited via a classical directory traversal attack by constructing a malicious ".APK" file, which extracts the included files to arbitrary locations on a user's system when the file is opened.
Since GameSpy Arcade during installation adds three mime types to the list of accepted browser documents, it is possible to exploit the vulnerability automatically by tricking the user into visiting a malicious web site with a browser.
Successful exploitation writes the files to the user's system with the user's privileges.
NOTE: ".arcade" and ".asn" files will also be launched by "GSAPAK.exe" automatically.
Solution: A patch should be available, which can be installed automatically via GameSpy Arcade.
Provided and/or discovered by: Mike Kristovich
Original Advisory: http://www.threezee.com/sections/security/tzt002.txt
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com