Security Patch for Tribes 2
This patch fixes a serious remote code execution vulnerability in the network code of Tribes 2.
The vulnerability affects both the client and server.
If anybody wants proof that there is a problem, I can show how it is exploitable remotely. (I will only do this if asked to by the server owner)
To install the patch, put it in the scripts/autoexec folder.
https://dl-web.dropbox.com/s/dc15omwgqh1krij/security.cs
The vulnerability affects both the client and server.
If anybody wants proof that there is a problem, I can show how it is exploitable remotely. (I will only do this if asked to by the server owner)
To install the patch, put it in the scripts/autoexec folder.
https://dl-web.dropbox.com/s/dc15omwgqh1krij/security.cs
Comments
These patches seem to ensure that some vulnerable 256 byte buffer (or pair of buffers?) is not overflown? I haven't looked at these in the context of the code they're patching, but (to anyone uncertain) this is safe to use.
Given that the game was written in C++ almost 2 decades ago (thus not representing a paragon of secure software development practices), do you think there are other comparable issues exposed to the network processing code in the game, or is this the only one you think is reasonably plausible?