[cod] SecurityFocus

Robert Mount rmount at gmail.com
Sat Feb 26 20:17:58 EST 2005


There's a 1.5b patch for COD here http://www.callofduty.com/patch/

But no UO patch on the UO version of that site.

If you've got the
http://0day.icculus.org/cod/COD-CODUO-lnxded-bins-12212004.tar.bz2
files, you're all set.


On Sat, 26 Feb 2005 13:36:36 -0500, Mark J. DeFilippis <defilm at acm.org> wrote:
>  Geez, away busy for 2 weeks and do I have a lot of catching up to do!
> 
>  From the posting in of the link, which as pointed out is in spanish, it
> appears he
>  has a patch for COD 1.5b and codUO 1.51b, yet I can't find it.
> 
>  TWL ET competition manager mentions it impacts ET (and other
>  Quake3 engine games), but no one else has put two and two together
>  there and said "hey COD folks, install this"...
> 
>  So I would imagine most COD and UO servers are largely unpached.
>  It is a problem.  They have taken down my FOY 24x7 32 man server so
>  often, (packed 24x7), it is now empty. :-(
> 
>  Some indicate they installed the patch for SOF and COD COD:UO, anyone
>  have a link that works?
> 
>  Thanks
> 
>  Md
> 
> 
>  
>  At 03:07 PM 2/16/2005, you wrote:
>  
> I can feel your fustration. Untill recently, I had no idea I had a
> "non-patched" sof2 linux binaries. Well someone banned someone for cheating.
> So the little prick tracked down my range and keep taking the servers down
> three to 8 times a day. Since sof2 takes barely nothing to run, we place
> them on all one box. The exploit would crash every server on the box. Delta
> Ray fixed me right up with the Luigi patch and the little hacker is now
> non-existant. So his patches certainly work. I could guarantee that Ryan is
> gonna fix it up for the official release. Ryan has always done us right!
> 
>  -Jay
> 
>  
>  ----- Original Message ----- From: "Ian mu" <mu.llamas at gmail.com>
>  To: <cod at icculus.org>
>  Sent: Wednesday, February 16, 2005 1:56 PM
>  Subject: Re: [cod] SecurityFocus
> 
>  
>  
> Yeah just want to apologise, if he has approached everyone and had
>  negative feedback from them in terms of them fixing it (but then again
>  its tricky, if they aren't going to patch it for sure, isnt that more
>  reason to release a patch and not release the exploit?), then yes I
>  can understand it more in truth, and I'm getting more of an impression
>  at least whilst I still wouldn't do it, he seems like someone who at
>  least has gone down the path of contacting the correct people, so in
>  that respect I'm probably a little hasty with comments, and fair play
>  to him on that side.
> 
>  I'm just in a bad mood as been trying to fix servers all day because of it
> hehe.
>  
> 
> S1-------------------------------------------------------------------------------
>  Mark J. DeFilippis, Ph. D EE          defilm at acm.org
>                                        defilm at ieee.org
> 
>  
>



More information about the Cod mailing list