Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Multiple format string vulnerabilities in the Monolith Lithtech engine, as used by First Encounter Assault Recon (F.E.A.R.) 1.08 and earlier, when Punkbuster (PB) is enabled, allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in (1) a PB_Y packet to the YPG server on UDP port 27888 or (2) a PB_U packet to UCON on UDP port 27888, different vectors than CVE-2004-1500. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Monolith Productions First Encounter Assault Recon 格式化字符串漏洞
Vulnerability Description
当Punkbuster (PB)被激活时,First Encounter Assault Recon (F.E.A.R.) 1.08版本及其早期版本中使用的Monolith Lithtech engine中存在多个格式用字符串漏洞使远程攻击者执行任意代码或造成拒绝服务(daemon 崩溃)可以借助(1)UDP port 27888的YPG服务器的一个PB_Y信息包或者(2)UDP port 27888的UCON的一个PB_U信息包中指定的格式字符串。
CVSS Information
N/A
Vulnerability Type
N/A