Loading HuntDB...

Malformed playlist.txt in GoldSrc games leads to Access Violation & arbitrary code execution

High
V
Valve
Submitted None
Reported by nyancat0131

Vulnerability Details

Technical details and impact analysis

Stack Overflow
A crafted `playlist.txt` can be used to exploit a stack overflow vulnerability in `GameUI.dll` that can lead to arbitrary code execution. # Reproduction Place attached `playlist.txt` in game directory (`valve`, `cstrike`, etc.). The game will crash when it tries to play `Splash` track. # Exploitability The file can be sent from server with `precache_generic` function (custom `mp.dll`, amxx plugins, etc.). I don't know ant way to force reload the playlist, so for the exploit to trigger, the client must be restarted. In my opinion, it's still dangerous. And this method won't work if the client already had `playlist.txt` in the game directory. ## Impact The attacker can use this to do many things, from crashing the client to stealing important data.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$1000.00

Submitted

Weakness

Stack Overflow