CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
66.3%
Format string vulnerability in the Epic Games Unreal engine client, as used in multiple games, allows remote servers to execute arbitrary code via (1) the CLASS parameter in a DLMGR command, (2) a malformed package (PKG), and possibly (3) the LEVEL parameter in a WELCOME command.
Vendor | Product | Version | CPE |
---|---|---|---|
epicgames | unreal_engine | 2 | cpe:2.3:a:epicgames:unreal_engine:2:*:*:*:*:*:*:* |
epicgames | unreal_engine | 2.5 | cpe:2.3:a:epicgames:unreal_engine:2.5:*:*:*:*:*:*:* |
epicgames | unreal_engine | 3 | cpe:2.3:a:epicgames:unreal_engine:3:*:*:*:*:*:*:* |
aluigi.altervista.org/adv/unrealcfs-adv.txt
archives.neohapsis.com/archives/fulldisclosure/2008-09/0190.html
secunia.com/advisories/31854
www.osvdb.org/48290
www.osvdb.org/48291
www.securityfocus.com/archive/1/496297/100/0/threaded
www.securityfocus.com/bid/31141
exchange.xforce.ibmcloud.com/vulnerabilities/45088
exchange.xforce.ibmcloud.com/vulnerabilities/45089
exchange.xforce.ibmcloud.com/vulnerabilities/45090