First published: Mon Jul 12 2010(Updated: )
Buffer overflow in the UGameEngine::UpdateConnectingMessage function in the Unreal engine 1, 2, and 2.5, as used in multiple games including Unreal Tournament 2004, Unreal tournament 2003, Postal 2, Raven Shield, and SWAT4, when downloads are enabled, allows remote attackers to execute arbitrary code via a long LEVEL field in a WELCOME response to a download request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Unreal Engine | =1 | |
Unreal Engine | =2 | |
Unreal Engine | =2.5 | |
Postal 2 | ||
Raven Shield | ||
Sierra SWAT 4 | ||
Unreal Tournament | ||
Unreal Tournament |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2702 has a high severity rating due to its potential to allow remote code execution.
To mitigate CVE-2010-2702, disable downloads in the Unreal Engine settings or update to a patched version of the affected software.
CVE-2010-2702 affects versions 1, 2, and 2.5 of the Unreal Engine, as well as games like Unreal Tournament 2003, 2004, Postal 2, Raven Shield, and SWAT 4.
Yes, CVE-2010-2702 can be exploited remotely when downloads are enabled in the affected software.
Exploiting CVE-2010-2702 can allow attackers to execute arbitrary code on the targeted system.