Home

Description

UFO: Alien Invasion versions up to and including 2.2.1 contain a buffer overflow vulnerability in its built-in IRC client component. When the client connects to an IRC server and receives a crafted numeric reply (specifically a 001 message), the application fails to properly validate the length of the response string. This results in a stack-based buffer overflow, which may corrupt control flow structures and allow arbitrary code execution. The vulnerability is triggered during automatic IRC connection handling and does not require user interaction beyond launching the game.

PUBLISHED Reserved 2025-08-20 | Published 2025-08-22 | Updated 2025-08-22 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unaffected

*
affected

Credits

Jason Geffner finder

References

raw.githubusercontent.com/...exploits/windows/misc/ufo_ai.rb exploit

raw.githubusercontent.com/...les/exploits/osx/misc/ufo_ai.rb exploit

www.exploit-db.com/exploits/16864 exploit

www.exploit-db.com/exploits/14013 exploit

www.moddb.com/news/ufo-alien-invasion-231-released vendor-advisory patch

www.vulncheck.com/...ien-invasion-irc-client-buffer-overflow third-party-advisory

cve.org (CVE-2009-10006)

nvd.nist.gov (CVE-2009-10006)

Download JSON