module

Unreal Tournament 2004 "secure" Overflow (Linux)

Disclosed
Jun 18, 2004
Created
May 30, 2018

Description

This is an exploit for the GameSpy secure query in
the Unreal Engine.

This exploit only requires one UDP packet, which can
be both spoofed and sent to a broadcast address.
Usually, the GameSpy query server listens on port 7787,
but you can manually specify the port as well.

The RunServer.sh script will automatically restart the
server upon a crash, giving us the ability to
bruteforce the service and exploit it multiple
times.

Author

onetwo

Platform

Linux

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/linux/games/ut2004_secure
msf exploit(ut2004_secure) > show targets
...targets...
msf exploit(ut2004_secure) > set TARGET < target-id >
msf exploit(ut2004_secure) > show options
...show and set options...
msf exploit(ut2004_secure) > exploit

Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.