Forgiven EA for the SimCity launch fiasco and the Origin vulnerability yet? No? Good, because EA may have yet another mess on its hands. According to Ars Techncia, a bug in the company's free-to-play Battlefield spinoff, Battlefield Play4Free, allows the execution of malicious code on vulnerable systems. The security hole was uncovered at a security conference earlier this month, and here's how it works, in Ars' words:
The webpage used in the exploit opens the game on a victim's computer and instructs it to load a malicious "MOD" file used to customize game settings and features, according to a document the researchers published Friday. Using some nonstandard behavior of a programming interface version found only in older versions of Windows, the MOD file is able to upload a malicious batch file that will be executed the next time the computer is restarted.
Don't rush to uninstall the game just yet—only Windows XP and Windows 2003 are vulnerable, which means anyone who's bothered to upgrade their operating system in the past six years should be okay. Not everybody has, of course. Ars says 39% of Battlefield Play4Free's one million players still run Windows XP.
The site goes on to say EA is "investigating the report" but doesn't have an official statement yet. Considering this is a hole found by security researchers, there's a fair chance it hasn't been exploited in the wild yet, which may give EA some time to address the problem. Hackers can move quickly, though, and the proof of concept is public.
|Nvidia's GeForce GTX 1080 graphics card reviewed||74|
|Color TV Day Shortbread||11|
|Oculus removes hardware check DRM from Rift exclusives||9|
|Only one month to go before the "second-10th" TR BBQ||4|
|Deals of the week: an affordable Core i7-6700K and gaming gear||17|
|3DMark is getting a full-featured DirectX 12 benchmark||29|
|Swim-a-Lap Day Shortbread||15|
|Steam Summer Picnic sale is all about tasty games||41|
|Corsair Vengeance LED DIMMs are serious about color coordination||22|