Half-life exploit found

35

Saw on Blues that Securityfocus posted an alert that should alert Half-life 1.1.0.8 users that that particular version can be exploited by a buffer-overflow.

By running the command with around 128 characters it is possible to overflow the buffer and execute arbitrary code. While this problem is on the client side it is still a serious issue, since servers have a function named "g_engfuncs.pfnClientCommand" which allows the server to force clients to execute whatever console command they want. This means that this overflow can be exploited remotely by means of this function. A server administrator could easily easily take advantage of this and exploit clients automatically as they connected to the server.

From The Chatty
Hello, Meet Lola