Download Counter-Strike Global Offensive 126.96.36.199 – ‘vphysics.dll’ Denial of Service (PoC) Counterstrike Global Offensive
ounter-Strike Global Offensive 188.8.131.52 – ‘vphysics.dll’ Denial of Service (PoC)
Counter-Strike Global Offensive (vphysics.dll) before 184.108.40.206 allows remote attackers to achieve code execution or denial of service by creating a gaming server and inviting a victim to this server, because a crafted map using memory corruption.
We are need modifying class name value in our PoC for triggering this vulnerability, offset for modifying in our PoC is `0x115703`. For example add char `”=”` using this offset. PoC is “mc.bsp”
For modeling situation for attack we are need next:
First step is copy mc.bsp to `C:Program Files (x86)SteamsteamappscommonCounter-Strike Global Offensivecsgomaps`;
Second step is start game with our map (mc.bsp), for this we are need turn on game console and insert in console: `map mc`.
After this steps we can see next:
I was use msec.dll (!exploitable) is a Windows debugging extension (Windbg) that provides automated crash analysis and security risk assessment [Download msec.dll](https://archive.codeplex.com/?p=msecdbg)
As you can see msec.dll checked this crash and decide that is EXPLOITABLE crash, because SEH chain is corrupted. It is means that attacker can use this vulnerability for remote code execution.
EDB Note: https://github.com/offensive-securit…oits/47454.bsp
<edit> I don’t know if it’s been updated by now, but still a good learning curve.