gemcneill Posted January 29, 2009 Share Posted January 29, 2009 Had a player post this info and did some research. If I am reading this properly this exploit can be used to create a file on the client. .-443@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ !EMOSEWA SI RETSASIRHC Did a quick search and found this http://forums.steampowered.com/forums/showthread.php?p=8984121 http://bugs.garrysmod.com/print_bug_page.php?bug_id=1681 I think this could be pretty serious but not sure if there is anything I can do to prevent it. Has anyone else seen this issue? George Link to comment Share on other sites More sharing options...
nosit1 Posted January 29, 2009 Share Posted January 29, 2009 It's scriptkiddie crap. Garry has already removed writting out of the Gmod folder. Back in Gmod 9, the Racehook virus could delete anything it wanted, including system files. Tell them to look in their /cfg/ and /lua/autorun/client folder for and suspicious files. Link to comment Share on other sites More sharing options...
VicToMeyeZR Posted January 29, 2009 Share Posted January 29, 2009 Find a friend in a country that doesn't care if someone gets DDoS attacked. Link to comment Share on other sites More sharing options...
nosit1 Posted January 29, 2009 Share Posted January 29, 2009 It's just a con_logfile exploit. I doesn't steal your RCON, just makes any one that has admin powers execute admin commands against will. garrysmod/garrysmod/lua/vgui/removeme.lua Link to comment Share on other sites More sharing options...
nosit1 Posted January 29, 2009 Share Posted January 29, 2009 Temporary script to stop this, goes in lua/autorun/client/dontremoveme.lua (on the server, so clients will download it): if file.Exists'../lua/autorun/client/removeme.lua'then RunConsoleCommand('connect','1.3.3.7:9001')end Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.