Metasploit modules that can be used to exploit Robert Jordan products
-
Unreal Tournament 2004 "secure" Overflow (Linux)
Disclosure Date: 2004-06-18First seen: 2020-04-26exploit/linux/games/ut2004_secureThis is an exploit for the GameSpy secure query in the Unreal Engine. This exploit only requires one UDP packet, which can be both spoofed and sent to a broadcast address. Usually, the GameSpy query server listens on port 7787, but you can manually specify the port as well. The RunServer.sh script will automatically restart the server upon a crash, giving us the ability to bruteforce the service and exploit it multiple times. Authors: - onetwo -
Unreal Tournament 2004 "secure" Overflow (Win32)
Disclosure Date: 2004-06-18First seen: 2020-04-26exploit/windows/games/ut2004_secureThis is an exploit for the GameSpy secure query in the Unreal Engine. This exploit only requires one UDP packet, which can be both spoofed and sent to a broadcast address. Usually, the GameSpy query server listens on port 7787, but you can manually specify the port as well. The RunServer.sh script will automatically restart the server upon a crash, giving us the ability to bruteforce the service and exploit it multiple times. Authors: - stinko <vinnie@metasploit.com>
2 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details