Unreal Engine Exploit

Published by

It has now come to public attention that the base code of the Unreal engine suffers from a non existent handshake between client and server exploit. This circumstance allows DoS, DDoS and bounce attacks with spoofed UDP packets. This was discovered and published by Auriemma Luigi of PivX Solutions, which is a premier network security consultancy. Luigi's findings were posted on SecurityFocus' BugTraq mailing list. "These bugs have been around for 5 years. They could be used by malicious attackers in worms or large scale attacks that rival those of Nimda and Sapphire/Slammer... Really frightful." Luigi punctuates. All known games ranging from the original Unreal, via Deus Ex and Rune to UnrealTournament 2003 are affected by this. Epic did know about the exploits but until now has not worked on resolving them for own and licensees games. BluesNews contacted VP of Epic, Mark Rein who responded in an unusual way: I won't sugar coat this. We f****d up on this. Yes this is real and yes this was brought to our attention and yes we should have fixed it by now. We are working on fixing this now and we will have this fixed in an upcoming patch before too long. Johne Cook from 3DGPU points out that Epic has reacted rapidly today by releasing a beta patch 2191 to testers that should fix the above mentioned issues. Epic is probably going to provide updates for all affected software titles. Mr. Rein also sent along a preliminary changelog for 2191.