Forgiven EA for the SimCity launch fiasco and the Origin vulnerability yet? No? Good, because EA may have yet another mess on its hands. According to Ars Techncia, a bug in the company's free-to-play Battlefield spinoff, Battlefield Play4Free, allows the execution of malicious code on vulnerable systems. The security hole was uncovered at a security conference earlier this month, and here's how it works, in Ars' words:
The webpage used in the exploit opens the game on a victim's computer and instructs it to load a malicious "MOD" file used to customize game settings and features, according to a document the researchers published Friday. Using some nonstandard behavior of a programming interface version found only in older versions of Windows, the MOD file is able to upload a malicious batch file that will be executed the next time the computer is restarted.
Don't rush to uninstall the game just yet—only Windows XP and Windows 2003 are vulnerable, which means anyone who's bothered to upgrade their operating system in the past six years should be okay. Not everybody has, of course. Ars says 39% of Battlefield Play4Free's one million players still run Windows XP.
The site goes on to say EA is "investigating the report" but doesn't have an official statement yet. Considering this is a hole found by security researchers, there's a fair chance it hasn't been exploited in the wild yet, which may give EA some time to address the problem. Hackers can move quickly, though, and the proof of concept is public.
|The Tech Report System Guide: March 2017 edition||40|
|Elgato Stream Deck lets streamers play news desk||5|
|Puppy Day Shortbread||12|
|Brydge 12.3 makes the Surface Pro lap-worthy||18|
|Corsair One is an understated gaming monster||31|
|Futuremark adds Vulkan to its API Overhead test||3|
|Fallout 4 VR will draw in wastelanders at E3 2017||14|
|AMD publishes patches for Vega support on Linux||22|
|MSI brings custom GeForce GTX 1080 Ti cards by air and sea||12|
|I need this because of reasons.||+41|