id Software id Tech 4 Engine – ‘idGameLocal::GetGameStateObject()’ Remote Code Execution

  • 作者: Luigi Auriemma
    日期: 2010-07-21
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34178/
  • source: https://www.securityfocus.com/bid/41001/info
    
    id Tech 4 Engine is prone to a remote code-execution vulnerability.
    
    An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
    
    The following applications include the vulnerable engine:
    
    Enemy Territory: Quake Wars 1.5.12642.33243 and prior
    Wolfenstein 1.3.344272 and prior
    Quake 4 1.4.2 and prior
    Doom 3 1.3.1 and prior
    Prey 1.4 and prior 
    
    https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34178.zip