First published: Mon Mar 09 2009(Updated: )
Format string vulnerability in the Epic Games Unreal engine client, as used in multiple games, allows remote servers to execute arbitrary code via (1) the CLASS parameter in a DLMGR command, (2) a malformed package (PKG), and possibly (3) the LEVEL parameter in a WELCOME command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Epicgames Unreal Engine | =2 | |
Epicgames Unreal Engine | =3 | |
Epicgames Unreal Engine | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6441 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2008-6441, you should update the Unreal Engine to the latest patched version provided by Epic Games.
CVE-2008-6441 affects Unreal Engine versions 2, 2.5, and 3.
CVE-2008-6441 can be exploited through remote servers executing arbitrary code via specially crafted commands.
The impact of CVE-2008-6441 on games using Unreal Engine can lead to unauthorized remote code execution, potentially compromising user systems.