Description
Buffer overflow in Unreal Tournament 3 1.3beta4 and earlier allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a UDP packet containing a large value in a certain size field, followed by a data string of that size, aka attack 1 in ut3mendo.c.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Luigi Auriemma · textdosmultiple
https://www.exploit-db.com/exploits/32127
References (7)
Core 7
Core References
Third Party Advisory x_refsource_misc
http://aluigi.altervista.org/adv/ut3mendo-adv.txt
Various Sources x_refsource_misc
http://aluigi.org/poc/ut3mendo.zip
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44105
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/2260/references
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/494929/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/30430
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31265
Scores
EPSS
0.2647
EPSS Percentile
96.3%
Details
CWE
CWE-119
Status
published
Products (3)
epic_games/unreal_tournament_3
1.1
epic_games/unreal_tournament_3
1.2
epic_games/unreal_tournament_3
< 1.3
Published
Jul 31, 2008
Tracked Since
Feb 18, 2026