module

Unreal Tournament 2004 "secure" Overflow (Win32)

Disclosed
2004-06-18
Created
2018-05-30

Description

This is an exploit for the GameSpy secure query in
the Unreal Engine.

This exploit only requires one UDP packet, which can
be both spoofed and sent to a broadcast address.
Usually, the GameSpy query server listens on port 7787,
but you can manually specify the port as well.

The RunServer.sh script will automatically restart the
server upon a crash, giving us the ability to
bruteforce the service and exploit it multiple
times.

Author

stinko vinnie@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/games/ut2004_secure
msf exploit(ut2004_secure) > show targets
...targets...
msf exploit(ut2004_secure) > set TARGET < target-id >
msf exploit(ut2004_secure) > show options
...show and set options...
msf exploit(ut2004_secure) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.