Looking at that thread, it appears that engine_win32.dll has a working bypass of the net_file blacklist. If anyone has a sample of that file I would be interested in taking a look at it.

A quick look at the provided files (gist: https://gist.github.com/Chrisaster/d9872acbf2da227e9281) suggests that: - Initial infection from client to server is in client_init.lua, which downloads server.cfg (looking for the RCON password to continue the exploit) and uploads engine_win32.dll - Once the server runs the server_infect.lua code, it writes back engine_win32.dll and does a SendLua to install client_init.lua

If you've firewalled off RCON (as you should have) then this particular version of the exploit won't hurt you. However, there is definitely some sort of bypass for the net_file blacklist.

On 4/18/2014 9:11 PM, wickedplayer494 wrote:
http://facepunch.com/showthread.php?t=1386818

If your clients are complaining about "*cough*" spam or similar through Steam chat, this is what's causing it. It may be wise to just completely kill your server until the Facepunch folks release an update to fix this (even though it's 3 AM in the UK), as it's rumored that even if rcon/client uploads are disabled, it'll still work.

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds

Reply via email to