The Steam URL protocol can be abused to exploit vulnerabilities in games, researchers say

Attackers can trick gamers into opening malicious steam:// URLs that exploit security issues in games to execute malicious code

By Lucian Constantin, IDG News Service |  Software

Aside from tricking users to manually click on rogue steam:// URLs, attackers can use JavaScript code loaded on malicious pages to redirect browsers to such URLs, Luigi Auriemma said Tuesday via email.

Browsers that require user confirmation for steam:// URL execution by default usually provide users with an option to change this behavior and have the URLs automatically executed by the Steam client, Auriemma said. " It's highly possible that many gamers already have the steam:// links directly executed in the browser to avoid the annoyance of confirming them all the time."

The researchers released a video in which they demonstrate how steam:// URLs can be used to remotely exploit some vulnerabilities they found in the Steam client and popular games.

For example, the Steam protocol's "retailinstall" command can be used to load a malformed TGA splash image file that exploits a vulnerability in the Steam client to execute malicious code in the context of its process, the researchers said.

In a different example, a steam:// URL can be used to execute legitimate commands found in Valve's Source game engine in order to write a .bat file with attacker-controlled content inside of Windows Startup folder. Files located in the Windows Startup directory are automatically executed when users log in.

The Source game engine is used in many popular games including Half-Life, Counter-Strike and Team Fortress that have tens of millions of players.

Another popular game engine called Unreal supports the loading of files from remote WebDAV or SMB shared directories through command line parameters. A rogue steam:// URL can be used to load a malicious file from such a location that exploits one of the many integer overflow vulnerabilities found in the game engine to execute malicious code, the ReVuln researchers said.

The auto-update feature found in some games like APB Reloaded or MicroVolts can also be abused through steam:// URLs to create files with attacker-controlled content on the disk.

In order to protect themselves users can disable the steam:// URL protocol handler manually or with a specialized application, or can use a browser that doesn't automatically execute steam:// URLs, Auriemma said. "The downside is that the gamers who use these links locally (shortcuts) or online (web browser) to join servers or use other features of this protocol will be unable to use them."

Because Safari is one of the browsers that automatically executes steam:// URLs, Mac OS X users, which represent the majority of the browser's user base, might be more exposed to such attacks. "Mac OS is the secondary platform used on Steam and many games are available for this platform so it has a wide user base," Auriemma said.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Ask a Question
randomness