[cod] crash exploit

Georgecooldude georgecooldude at gmail.com
Mon Jan 14 19:06:39 EST 2008


Whats the deal with this?

Was the exploit ever located? Hopefully this will be patched in 1.5?

On Jan 13, 2008 10:20 PM, Tyson Couch <twisted at twistedgamingservice.com>
wrote:

> As far as I've been able to surmise is that setting the following cvar in
> your server config stops anyone from being able to do the exploit.
>
> Set sv_disableClientConsole 1
>
> Problem is this also stops people from using RCON commands in game because
> the server is disabling there console.
>
> How it's being done my fellow staff members at PsB (PunksBusted.com) and I
> haven't been able to figure it out.
>
>
> Tyson aka Runner23
> Twisted Gaming Service
> http://www.twistedgamingservice.com
>
>
> -----Original Message-----
> From: Geoff Goas [mailto:gitman at gmail.com]
> Sent: Sunday, January 13, 2008 12:38 PM
> To: cod at icculus.org
> Subject: [cod] crash exploit
>
> at the risk of "spreading the news", looks like theres a buffer overflow
> crash exploit for cod4.
>
> http://www.infinityward.com/community/forum/index.php?topic=9867.0
>
> ERROR: Attempted to overrun string in call to va()
>
> if anyone has any info on this, it'd be nice to get it to ryan ASAP.
>
> --
> Geoff Goas
> IT Specialist, http://www.goastech.com
> Administrator, http://www.anarchic-x.com
>
>
> ---
> To unsubscribe, send a blank email to cod-unsubscribe at icculus.org
> Mailing list archives: http://icculus.org/cgi-bin/ezmlm/ezmlm-cgi?38
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://icculus.org/pipermail/cod/attachments/20080115/0485179a/attachment.htm>


More information about the Cod mailing list