lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <C7623503-2B7C-4C4D-BA97-DAA7ADC1E97C@revuln.com> Date: Wed, 14 Nov 2012 10:52:25 +0100 From: ReVuln <info@...uln.com> To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk Subject: 0-day vulnerabilities in Call of Duty MW3 and CryEngine 3 Following our presentation at POC2012 [1] conference, we have released: a paper [2] regarding a NULL pointer dereference vulnerability affecting Call of Duty: Modern Warfare 3 [3], and a video [4] demonstrating a remote code execution vulnerability affecting CryEngine 3 [5]. [1] http://powerofcommunity.net [2] http://revuln.com/files/ReVuln_CoDMW3_null_pointer_dereference.pdf [3] http://www.callofduty.com/mw3 [4] http://vimeo.com/53425372 [5] http://www.crytek.com/cryengine/cryengine3 --- ReVuln http://revuln.com http://twitter.com/revuln _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists