CVE-2008-6441

N/A Unknown
Published: March 09, 2009 Modified: April 23, 2026
View on NVD

Description

Format string vulnerability in the Epic Games Unreal engine client, as used in multiple games, allows remote servers to execute arbitrary code via (1) the CLASS parameter in a DLMGR command, (2) a malformed package (PKG), and possibly (3) the LEVEL parameter in a WELCOME command.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31854
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/48290
Source: cve@mitre.org
http://www.osvdb.org/48291
Source: cve@mitre.org
http://www.securityfocus.com/bid/31141
Source: cve@mitre.org
Exploit
http://aluigi.altervista.org/adv/unrealcfs-adv.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0190.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/31854
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/48290
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/48291
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/496297/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/31141
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/45088
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/45089
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/45090
Source: af854a3a-2127-422b-91ae-364da2661108

20 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.4%
85th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

epicgames