<html>
<head>
<style>
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
FONT-SIZE: 10pt;
FONT-FAMILY:Tahoma
}
</style>
</head>
<body class='hmmessage'>
I have forwarded this to fourzerotwo and he is giving it to one of the devs so hopefully its been fixed in 1.5<BR><BR>> From: twisted@twistedgamingservice.com<BR>> To: cod@icculus.org<BR>> Date: Mon, 14 Jan 2008 17:35:05 -0700<BR>> Subject: RE: [cod] crash exploit<BR>> <BR>> It was only brought to our attention yesterday. I don't know if anyone has<BR>> found how there doing it.<BR>> <BR>> Were still trying to figure it out so we can report it to get fixed.<BR>> <BR>> Tyson<BR>> Twisted Gaming service<BR>> http://www.twistedgamingservice.com<BR>> <BR>> <BR>> -----Original Message-----<BR>> From: Georgecooldude [mailto:georgecooldude@gmail.com] <BR>> Sent: Monday, January 14, 2008 5:07 PM<BR>> To: cod@icculus.org<BR>> Subject: Re: [cod] crash exploit<BR>> <BR>> Whats the deal with this?<BR>> <BR>> Was the exploit ever located? Hopefully this will be patched in 1.5?<BR>> <BR>> <BR>> On Jan 13, 2008 10:20 PM, Tyson Couch < twisted@twistedgamingservice.com<BR>> <mailto:twisted@twistedgamingservice.com> > wrote:<BR>> <BR>> <BR>> As far as I've been able to surmise is that setting the following<BR>> cvar in <BR>> your server config stops anyone from being able to do the exploit.<BR>> <BR>> Set sv_disableClientConsole 1<BR>> <BR>> Problem is this also stops people from using RCON commands in game<BR>> because<BR>> the server is disabling there console. <BR>> <BR>> How it's being done my fellow staff members at PsB (PunksBusted.com)<BR>> and I<BR>> haven't been able to figure it out.<BR>> <BR>> <BR>> Tyson aka Runner23<BR>> Twisted Gaming Service<BR>> http://www.twistedgamingservice.com<BR>> <http://www.twistedgamingservice.com> <BR>> <BR>> <BR>> <BR>> -----Original Message-----<BR>> From: Geoff Goas [mailto:gitman@gmail.com]<BR>> Sent: Sunday, January 13, 2008 12:38 PM <BR>> To: cod@icculus.org<BR>> Subject: [cod] crash exploit<BR>> <BR>> at the risk of "spreading the news", looks like theres a buffer<BR>> overflow<BR>> crash exploit for cod4.<BR>> <BR>> http://www.infinityward.com/community/forum/index.php?topic=9867.0<BR>> <http://www.infinityward.com/community/forum/index.php?topic=9867.0> <BR>> <BR>> ERROR: Attempted to overrun string in call to va()<BR>> <BR>> if anyone has any info on this, it'd be nice to get it to ryan ASAP.<BR>> <BR>> --<BR>> Geoff Goas<BR>> IT Specialist, http://www.goastech.com<BR>> Administrator, http://www.anarchic-x.com<BR>> <BR>> <BR>> <BR>> ---<BR>> To unsubscribe, send a blank email to cod-unsubscribe@icculus.org<BR>> Mailing list archives: http://icculus.org/cgi-bin/ezmlm/ezmlm-cgi?38<BR>> <http://icculus.org/cgi-bin/ezmlm/ezmlm-cgi?38> <BR>> <BR>> <BR>> <BR>> <BR>> <BR>> <BR>> <BR>> ---<BR>> To unsubscribe, send a blank email to cod-unsubscribe@icculus.org<BR>> Mailing list archives: http://icculus.org/cgi-bin/ezmlm/ezmlm-cgi?38<BR>> <BR>> <BR><br /><hr />Vad har Britney för sig? Kolla in senaste kändisnyheterna! <a href='http://starlounge.msn.se/' target='_new'>MSN Kändisnytt</a></body>
</html>