Format string vulnerability in the logging function in IGI 2 Covert Strike server 1.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in RCON commands.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| I.g.i-2_covert_strike | Pan_vision | 1.0 (including) | 1.0 (including) |
| I.g.i-2_covert_strike | Pan_vision | 1.1 (including) | 1.1 (including) |
| I.g.i-2_covert_strike | Pan_vision | 1.2 (including) | 1.2 (including) |
| I.g.i-2_covert_strike | Pan_vision | 1.3 (including) | 1.3 (including) |