Looking at that thread, it appears that engine_win32.dll has a working
bypass of the net_file blacklist. If anyone has a sample of that file I
would be interested in taking a look at it.
A quick look at the provided files (gist:
https://gist.github.com/Chrisaster/d9872acbf2da227e9281) suggests that:
- Initial infection from client to server is in client_init.lua, which
downloads server.cfg (looking for the RCON password to continue the
exploit) and uploads engine_win32.dll
- Once the server runs the server_infect.lua code, it writes back
engine_win32.dll and does a SendLua to install client_init.lua
If you've firewalled off RCON (as you should have) then this particular
version of the exploit won't hurt you. However, there is definitely some
sort of bypass for the net_file blacklist.
On 4/18/2014 9:11 PM, wickedplayer494 wrote:
http://facepunch.com/showthread.php?t=1386818
If your clients are complaining about "*cough*" spam or similar
through Steam chat, this is what's causing it. It may be wise to just
completely kill your server until the Facepunch folks release an
update to fix this (even though it's 3 AM in the UK), as it's rumored
that even if rcon/client uploads are disabled, it'll still work.
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives,
please visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds