exploit-db-mirror/platforms/windows/remote/33172.txt
Offensive Security 5924dde297 DB: 2015-03-19
2 new exploits
2015-03-19 09:39:10 +00:00

10 lines
No EOL
684 B
Text
Executable file

source: http://www.securityfocus.com/bid/36061/info
Source Engine is prone to a format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.
An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in a denial-of-service condition.
Source Engine 3968 and prior builds are affected.
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/33172-1.zip
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/33172-2.zip