[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 112: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4669: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3816)
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4671: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3816)
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4672: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3816)
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4673: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3816)
Black Ops Squadron :: View topic - Game security
Black Ops Squadron
http://www.blackopssquadron.com/forums/

Game security
http://www.blackopssquadron.com/forums/viewtopic.php?f=22&t=1103
Page 1 of 1

Author:  Dagger2b [ Fri Oct 12, 2007 2:52 pm ]
Post subject:  Game security

FYI...
------------------------------------------------------
TITLE:
America's Army Special Forces Unreal Engine Denial Of Service

SECUNIA ADVISORY ID:
SA27015

VERIFY ADVISORY:
http://secunia.com/advisories/27015/

CRITICAL:
Moderately critical

IMPACT:
DoS

WHERE:
From remote

SOFTWARE:
America's Army Special Forces 2.x
http://secunia.com/product/15910/

DESCRIPTION:
Luigi Auriemma has reported some vulnerabilities in America's Army,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

For more information:
SA26506

Successful exploitation requires that the "PunkBuster" feature is
enabled on the affected server.

The vulnerabilities are reported in version 2.8.2 and prior. Other
versions may also be affected.

SOLUTION:
Host games on a trusted network only.

PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
--------------------------------------------------------------------
TITLE:
Doom 3 Engine Format String Vulnerability

SECUNIA ADVISORY ID:
SA27002

VERIFY ADVISORY:
http://secunia.com/advisories/27002/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
From remote

SOFTWARE:
DOOM 3 Version 1.x
http://secunia.com/product/5843/

DESCRIPTION:
Luigi Auriemma has reported a vulnerability in Doom 3, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially to compromise a vulnerable system.

The vulnerability is caused due to a format string error in the Doom
3 engine when displaying certain PunkBuster packets in the game
console. This can be exploited via specially crafted "PB_Y" or "PB_U"
packets sent to the server.

Successful exploitation may allow execution of arbitrary code but
requires that PunkBuster is active on the server.

SOLUTION:
Host games only in a trusted network environment.

PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
---------------------------------------------------------------------

Author:  YourFather [ Fri Oct 12, 2007 7:55 pm ]
Post subject: 

what does this mean?

Author:  whizperz [ Fri Oct 12, 2007 10:24 pm ]
Post subject: 

Well a typical denial of service attack is aimed at one thing...Bringing the target machine down. Traditional DoS attacks happen when someone exploits the way TCP makes the 3-way handshake. What happens is that the target machine starts allocating resources for the attacker's machine to use during the "connection." The attacker will keep requesting for the target machine to allocate resources until all the resources are used up and the computer basically chokes.

With the AA exploit, it sounds like there is a way to use PB to basically lag out and lock up a user's computer. It is hard to say if that is something that has to be ran with rcon access or if just any user on the server could do it.

Now with the Doom 3 exploit, it sounds like there is a way to send the game server a malformed packet. Most likely, once the server receives it and sends it to the user, Doom 3 will open the packet thinking it is something from PB and run whatever code it was sent.

Author:  Dagger2b [ Sun Oct 14, 2007 2:36 pm ]
Post subject: 


Page 1 of 1 All times are UTC - 5 hours
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
http://www.phpbb.com/