CVE-2009-10006
CRITICALUFO: Alien Invasion <2.2.1 - RCE
Title source: llmDescription
UFO: Alien Invasion versions up to and including 2.2.1 contain a buffer overflow vulnerability in its built-in IRC client component. When the client connects to an IRC server and receives a crafted numeric reply (specifically a 001 message), the application fails to properly validate the length of the response string. This results in a stack-based buffer overflow, which may corrupt control flow structures and allow arbitrary code execution. The vulnerability is triggered during automatic IRC connection handling and does not require user interaction beyond launching the game.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteosx
https://www.exploit-db.com/exploits/16864
exploitdb
WORKING POC
VERIFIED
by Jason Geffner · textremotewindows
https://www.exploit-db.com/exploits/14013
metasploit
WORKING POC
NORMAL
by Jason Geffner, dookie · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/ufo_ai.rb
metasploit
WORKING POC
NORMAL
by Jason Geffner, dookie · rubypocosx
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/misc/ufo_ai.rb
References (6)
Scores
CVSS v4
9.3
EPSS
0.5264
EPSS Percentile
98.0%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-121
Status
published
Products (1)
UFO: Alien Invasion Project/UFO: Alien Invasion
< 2.2.1
Published
Aug 22, 2025
Tracked Since
Feb 18, 2026