That exploit was fixed long time ago.
Someone even made a tempfix:
https://forums.alliedmods.net/showthread.php?t=100958

On 3 September 2015 at 21:57, Refeek Yeglek <[email protected]> wrote:

> 1. we have permission from valve to use it
>
> 2. this isn't a problem with our code, this is a problem with the Source
> SDK Base 2013 Multiplayer that is being distributed on Steam itself. If
> this was TF2C specific I wouldn't be letting server hosts know to take
> steps to prevent it happening in shit like Fistful of Frags or Fortress
> Forever.
>
> On Thu, Sep 3, 2015 at 1:53 PM, AnAkkk <[email protected]> wrote:
>
>> What did you expect, this leaked and illegal version of the Source Engine
>> you're talking of has years of unfixed exploits, obviously such thing was
>> going to happen one day.
>> I'm sure there are lot more exploits that Valve has already fixed.
>> Le 3 sept. 2015 22:47, "Refeek Yeglek" <[email protected]> a écrit :
>>
>>> Our guys who decompiled the copy when they got infected figured out it
>>> was a very very bad script kiddie thing designed for doing exactly what is
>>> going on right now. Lemme go find the name of it, someone posted the name
>>> and feature list in the FP thread when we were trying to figure out what
>>> the hell happened, as they're doing hijacks by remote desktopping your
>>> computers.
>>>
>>> On Thu, Sep 3, 2015 at 1:40 PM, Nathaniel Theis <[email protected]>
>>> wrote:
>>>
>>>> If, and that's a big if... hold on
>>>>
>>>> IF it's the VTF exploit I reported, yes. I'm skeptical that it is,
>>>> just because of how difficult it is to exploit in practice. It would
>>>> require very advanced Windows exploitation skills, and suggest a
>>>> well-motivated, targeted attacker. My hunch is that it's another exploit,
>>>> one that only works from malicious servers or custom maps. This one is
>>>> incredibly practical and easy to exploit.
>>>>
>>>> - Nate
>>>>
>>>> On Thu, Sep 3, 2015 at 1:34 PM, E. Olsen <[email protected]> wrote:
>>>>
>>>>> So, to confirm - Team Fortress 2 has already had this exploit fixed,
>>>>> correct?
>>>>>
>>>>> On Thu, Sep 3, 2015 at 4:32 PM, Nathaniel Theis <[email protected]>
>>>>> wrote:
>>>>>
>>>>>> Actually, it looks like that only affects very old versions,
>>>>>> (pre-2009 / aluigi) which have much worse exploits anyways. Sorry for the
>>>>>> confusion.
>>>>>>
>>>>>> On Thu, Sep 3, 2015 at 1:28 PM, Refeek Yeglek <[email protected]>
>>>>>> wrote:
>>>>>>
>>>>>>> I'll let the guys on my sourcemod's team who are looking into it
>>>>>>> know, thanks.
>>>>>>>
>>>>>>> On Thu, Sep 3, 2015 at 1:26 PM, Nathaniel Theis <[email protected]>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> Note that, depending on the engine version you're on (and even SDK
>>>>>>>> 2013 may not do this, I haven't checked), setting sv_allowupload 0 may 
>>>>>>>> do
>>>>>>>> literally nothing; on older versions, sv_allowupload just tells the 
>>>>>>>> client
>>>>>>>> not to upload anything to the server. The client can ignore it and do 
>>>>>>>> it
>>>>>>>> anyways.
>>>>>>>>
>>>>>>>> On Thu, Sep 3, 2015 at 1:19 PM, Ross Bemrose <[email protected]>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> You'd know if that'd been done as there would be announcements on
>>>>>>>>> the various hlds lists about updates for Counter-Strike: Source, Day 
>>>>>>>>> of
>>>>>>>>> Defeat: Source, and Half-Life 2: Deathmatch.
>>>>>>>>>
>>>>>>>>> However, what he's actually asking is that Valve update the Source
>>>>>>>>> SDK 2013 with these fixes so that game developers can pull the 
>>>>>>>>> changes from
>>>>>>>>> Github and merge them into their own games' code.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Thu, Sep 3, 2015 at 4:10 PM, Matthias "InstantMuffin" Kollek <
>>>>>>>>> [email protected]> wrote:
>>>>>>>>>
>>>>>>>>>> He is basically saying that the exploits Nathaniel found and
>>>>>>>>>> reported have only been fixed in Valve's main titles. He hasn't 
>>>>>>>>>> found or
>>>>>>>>>> reported a new exploit.
>>>>>>>>>> I think it has been mentioned by KyleS on one or multiple of
>>>>>>>>>> these mailing lists that these exploit fixes should be ported onto 
>>>>>>>>>> other
>>>>>>>>>> branches. Apparently that has not been done?
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> On 03.09.2015 22:06, N-Gon wrote:
>>>>>>>>>>
>>>>>>>>>> Someone give this man an unusual Finder's Fee
>>>>>>>>>>
>>>>>>>>>> On Thu, Sep 3, 2015 at 3:59 PM, Refeek Yeglek <
>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>
>>>>>>>>>>> Hi, I'm one of the developers for Team Fortress 2 Classic, a
>>>>>>>>>>> source mod project. Recently, someone abused a bug present in 
>>>>>>>>>>> Source SDK
>>>>>>>>>>> 2013 MP to distribute viruses to quite a few of our players and 
>>>>>>>>>>> developers.
>>>>>>>>>>> The way they did it was by abusing a spray exploit present in the 
>>>>>>>>>>> SDK 2013
>>>>>>>>>>> MP edition to upload a file pretending to be a spray to all players 
>>>>>>>>>>> and
>>>>>>>>>>> executing it. The technical info on how it works from one of our 
>>>>>>>>>>> other
>>>>>>>>>>> coders will be posted at the end of this email, but here's what you 
>>>>>>>>>>> need to
>>>>>>>>>>> know as a server owner:
>>>>>>>>>>>
>>>>>>>>>>> We don't know how many source games are vulnerable. The big name
>>>>>>>>>>> VALVe ones aren't, but any sourcemod probably is. This includes 
>>>>>>>>>>> ones on
>>>>>>>>>>> steam like Fortress Forever, or Fistful of Frags.
>>>>>>>>>>>
>>>>>>>>>>> If you're running a server for a non-VALVe or bigname(Titanfall,
>>>>>>>>>>> GMOD, etc.) Source Engine game, then here's what you need to do:
>>>>>>>>>>>
>>>>>>>>>>> 1. Set sv_upload to 0 on your server.
>>>>>>>>>>>
>>>>>>>>>>> 2. If you are a TF2C server host, shut your server down and
>>>>>>>>>>> start scanning your server for viruses.
>>>>>>>>>>>
>>>>>>>>>>> 3. Pester valve to fix this ASAP.
>>>>>>>>>>>
>>>>>>>>>>> TL;DR:
>>>>>>>>>>> Sprays can be exploited to run code on people's systems and
>>>>>>>>>>> break into accounts, we've had quite a few CS:GO and TF2 items 
>>>>>>>>>>> lifted from
>>>>>>>>>>> accounts and moved to trade alts and disappearing after that. 
>>>>>>>>>>> Disable
>>>>>>>>>>> sprays ASAP if you host a sourcemod multiplayer server.
>>>>>>>>>>>
>>>>>>>>>>> Here's the technical info for how stuff works:
>>>>>>>>>>>
>>>>>>>>>>> "The vulnerability is triggered by a missing check to see if a
>>>>>>>>>>> memory allocation succeded in the loading of VTFs. When the 
>>>>>>>>>>> material is
>>>>>>>>>>> loaded, there is space allocated for the material. The crucial 
>>>>>>>>>>> option in
>>>>>>>>>>> the using of this exploit is the option to skip Mipmaps from the 
>>>>>>>>>>> material.
>>>>>>>>>>> If, for instance, the first mipmap is skipped, the game will copy 
>>>>>>>>>>> the
>>>>>>>>>>> mipmap data to buffer + size of first mipmap. When the memory 
>>>>>>>>>>> allocation
>>>>>>>>>>> fails, the buffer will be 0, because thats what malloc returns on 
>>>>>>>>>>> out of
>>>>>>>>>>> memory. This means, that the only factor determining where the 
>>>>>>>>>>> block is put
>>>>>>>>>>> is determined by the size of the first mipmap. This way you can put 
>>>>>>>>>>> the
>>>>>>>>>>> data in the second mipmap whereever you want, meaning you can write 
>>>>>>>>>>> to a
>>>>>>>>>>> predictable location in memory. This is additionally encouraged due 
>>>>>>>>>>> to the
>>>>>>>>>>> fact that ASLR is disabled for the module in question. From that 
>>>>>>>>>>> point on
>>>>>>>>>>> ROP is used to mark a controlled memory location executable and 
>>>>>>>>>>> transfer
>>>>>>>>>>> control to it, bypassing DEP. The distribution of the malicious 
>>>>>>>>>>> material
>>>>>>>>>>> file can be easily done through the use of the spray system, which 
>>>>>>>>>>> uploads
>>>>>>>>>>> a custom material to the server and distributes it. This is of 
>>>>>>>>>>> course not
>>>>>>>>>>> the only way to distribute it, but one used in this case. This is 
>>>>>>>>>>> not
>>>>>>>>>>> absolutely accurate and technical details have been left out due to 
>>>>>>>>>>> them
>>>>>>>>>>> not influencing this exploit."
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> To unsubscribe, edit your list preferences, or view the list
>>>>>>>>>>> archives, please visit:
>>>>>>>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> _______________________________________________
>>>>>>>>>> To unsubscribe, edit your list preferences, or view the list 
>>>>>>>>>> archives, please 
>>>>>>>>>> visit:https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> _______________________________________________
>>>>>>>>>> To unsubscribe, edit your list preferences, or view the list
>>>>>>>>>> archives, please visit:
>>>>>>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> --
>>>>>>>>> Ross Bemrose
>>>>>>>>>
>>>>>>>>> _______________________________________________
>>>>>>>>> To unsubscribe, edit your list preferences, or view the list
>>>>>>>>> archives, please visit:
>>>>>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> To unsubscribe, edit your list preferences, or view the list
>>>>>>>> archives, please visit:
>>>>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> To unsubscribe, edit your list preferences, or view the list
>>>>>>> archives, please visit:
>>>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>>>>>
>>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> To unsubscribe, edit your list preferences, or view the list
>>>>>> archives, please visit:
>>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>>>>
>>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> To unsubscribe, edit your list preferences, or view the list archives,
>>>>> please visit:
>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>>>
>>>>>
>>>>
>>>> _______________________________________________
>>>> To unsubscribe, edit your list preferences, or view the list archives,
>>>> please visit:
>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>>
>>>>
>>>
>>> _______________________________________________
>>> To unsubscribe, edit your list preferences, or view the list archives,
>>> please visit:
>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>>
>>>
>> _______________________________________________
>> To unsubscribe, edit your list preferences, or view the list archives,
>> please visit:
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>>
>>
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
>
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds

Reply via email to