I don't have a sample, sorry. We're like 99% certain they're using the spray exploit however.
On Thu, Sep 3, 2015 at 1:34 PM, Nathaniel Theis <[email protected]> wrote: > How do you know that this is the spray exploit being used? The spray > issue is exceedingly difficult to exploit. There's another, very practical > RCE exploit I'm aware of, but it requires control of the server. > > Do you have any samples of the malicious sprays? > > Thanks, > Nate > > On Thu, Sep 3, 2015 at 1:30 PM, Refeek Yeglek <[email protected]> > wrote: > >> I'm not the guy who found it either, I'm just letting you guys know >> because this is some bad shit and we've already had account hijacks. >> >> On Thu, Sep 3, 2015 at 1:06 PM, N-Gon <[email protected]> wrote: >> >>> Someone give this man an unusual Finder's Fee >>> >>> On Thu, Sep 3, 2015 at 3:59 PM, Refeek Yeglek <[email protected]> >>> wrote: >>> >>>> Hi, I'm one of the developers for Team Fortress 2 Classic, a source mod >>>> project. Recently, someone abused a bug present in Source SDK 2013 MP to >>>> distribute viruses to quite a few of our players and developers. The way >>>> they did it was by abusing a spray exploit present in the SDK 2013 MP >>>> edition to upload a file pretending to be a spray to all players and >>>> executing it. The technical info on how it works from one of our other >>>> coders will be posted at the end of this email, but here's what you need to >>>> know as a server owner: >>>> >>>> We don't know how many source games are vulnerable. The big name VALVe >>>> ones aren't, but any sourcemod probably is. This includes ones on steam >>>> like Fortress Forever, or Fistful of Frags. >>>> >>>> If you're running a server for a non-VALVe or bigname(Titanfall, GMOD, >>>> etc.) Source Engine game, then here's what you need to do: >>>> >>>> 1. Set sv_upload to 0 on your server. >>>> >>>> 2. If you are a TF2C server host, shut your server down and start >>>> scanning your server for viruses. >>>> >>>> 3. Pester valve to fix this ASAP. >>>> >>>> TL;DR: >>>> Sprays can be exploited to run code on people's systems and break into >>>> accounts, we've had quite a few CS:GO and TF2 items lifted from accounts >>>> and moved to trade alts and disappearing after that. Disable sprays ASAP if >>>> you host a sourcemod multiplayer server. >>>> >>>> Here's the technical info for how stuff works: >>>> >>>> "The vulnerability is triggered by a missing check to see if a memory >>>> allocation succeded in the loading of VTFs. When the material is loaded, >>>> there is space allocated for the material. The crucial option in the using >>>> of this exploit is the option to skip Mipmaps from the material. If, for >>>> instance, the first mipmap is skipped, the game will copy the mipmap data >>>> to buffer + size of first mipmap. When the memory allocation fails, the >>>> buffer will be 0, because thats what malloc returns on out of memory. This >>>> means, that the only factor determining where the block is put is >>>> determined by the size of the first mipmap. This way you can put the data >>>> in the second mipmap whereever you want, meaning you can write to a >>>> predictable location in memory. This is additionally encouraged due to the >>>> fact that ASLR is disabled for the module in question. From that point on >>>> ROP is used to mark a controlled memory location executable and transfer >>>> control to it, bypassing DEP. The distribution of the malicious material >>>> file can be easily done through the use of the spray system, which uploads >>>> a custom material to the server and distributes it. This is of course not >>>> the only way to distribute it, but one used in this case. This is not >>>> absolutely accurate and technical details have been left out due to them >>>> not influencing this exploit." >>>> >>>> _______________________________________________ >>>> To unsubscribe, edit your list preferences, or view the list archives, >>>> please visit: >>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds >>>> >>>> >>> >>> _______________________________________________ >>> To unsubscribe, edit your list preferences, or view the list archives, >>> please visit: >>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds >>> >>> >> >> _______________________________________________ >> To unsubscribe, edit your list preferences, or view the list archives, >> please visit: >> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds >> >> > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds > >
_______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds

