Format string vulnerability in the logging function in IGI 2 Covert Strike server 1.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in RCON commands.
Name | Vendor | Start Version | End Version |
---|---|---|---|
I.g.i-2_covert_strike | Pan_vision | 1.0 (including) | 1.0 (including) |
I.g.i-2_covert_strike | Pan_vision | 1.1 (including) | 1.1 (including) |
I.g.i-2_covert_strike | Pan_vision | 1.2 (including) | 1.2 (including) |
I.g.i-2_covert_strike | Pan_vision | 1.3 (including) | 1.3 (including) |