Unknown
CVE-2004-0608
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- deusex 1.112 fm,
- devastation 390.0,
- linux 1.4,
- mobile forces 20000.0,
- nerf arena blast 1.2,
- postal 2 1337,
- tacticalops 3.4,
- tnn outdoors pro hunter,
- unreal engine 226f,
- unreal engine 433,
- unreal engine 436,
- unreal tournament 2003 2199 linux,
- unreal tournament 2003 2199 macos,
- unreal tournament 2003 2199 win32,
- unreal tournament 2003 2225 macos,
- unreal tournament 2003 2225 win32,
- unreal tournament 2004 macos,
- unreal tournament 2004 win32,
- unreal tournament 451b,
- wheel of time 333.0b,
- x-com enforcer
Weaknesses
Metasploit Modules
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: