Security Patch for Tribes 2

This patch fixes a serious remote code execution vulnerability in the network code of Tribes 2.
The vulnerability affects both the client and server.
If anybody wants proof that there is a problem, I can show how it is exploitable remotely. (I will only do this if asked to by the server owner)
To install the patch, put it in the scripts/autoexec folder.


  • memPatch("A3C300","A370C3A300E8D609A0FF8B46205053E98103A0FF");

    These patches seem to ensure that some vulnerable 256 byte buffer (or pair of buffers?) is not overflown? I haven't looked at these in the context of the code they're patching, but (to anyone uncertain) this is safe to use.

    Given that the game was written in C++ almost 2 decades ago (thus not representing a paragon of secure software development practices), do you think there are other comparable issues exposed to the network processing code in the game, or is this the only one you think is reasonably plausible?
  • This is almost certainly the only problem in Tribes2 that can be exploited for RCE. I also created a pull request for Torque3D to fix the same problem. There may be a few ways to crash a T2 server without RCE, but the only one I found was the Null command one which is already patched by cmdArmor
  • There is one more problem that I experienced when having too many bots, but I still need to make a fix for that. I made a temporary fix for it a while ago however it was buggy.
Sign In or Register to comment.