Malformed playlist.txt in GoldSrc games leads to Access Violation & arbitrary code execution

Disclosed: 2019-09-17 17:34:09 By nyancat0131 To valve
High
Vulnerability Details
A crafted `playlist.txt` can be used to exploit a stack overflow vulnerability in `GameUI.dll` that can lead to arbitrary code execution. # Reproduction Place attached `playlist.txt` in game directory (`valve`, `cstrike`, etc.). The game will crash when it tries to play `Splash` track. # Exploitability The file can be sent from server with `precache_generic` function (custom `mp.dll`, amxx plugins, etc.). I don't know ant way to force reload the playlist, so for the exploit to trigger, the client must be restarted. In my opinion, it's still dangerous. And this method won't work if the client already had `playlist.txt` in the game directory. ## Impact The attacker can use this to do many things, from crashing the client to stealing important data.
Actions
View on HackerOne
Report Stats
  • Report ID: 504951
  • State: Closed
  • Substate: resolved
  • Upvotes: 62
Share this report