module

Racer v0.5.3 Beta 5 Buffer Overflow

Disclosed
Aug 10, 2008
Created
May 30, 2018

Description

This module exploits the Racer Car and Racing Simulator game
versions v0.5.3 beta 5 and earlier. Both the client and server listen
on UDP port 26000. By sending an overly long buffer we are able to
execute arbitrary code remotely.

Author

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/games/racer_503beta5
msf exploit(racer_503beta5) > show targets
...targets...
msf exploit(racer_503beta5) > set TARGET < target-id >
msf exploit(racer_503beta5) > show options
...show and set options...
msf exploit(racer_503beta5) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.