Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
But as everyone buys knowing that it is the same as always....
CoD is known for RCE exploits on the older games.
https://steamcommunity.com/discussions/forum/0/4652759797630842960/
https://www.bleepingcomputer.com/news/security/cs-go-valve-source-games-vulnerable-to-hacking-using-steam-invites/
Valve has some policies that go against normal security practise.
https://arstechnica.com/information-technology/2023/02/game-mode-exploits-high-severity-flaw-that-went-unpatched-in-dota-2-for-months/
https://nvd.nist.gov/vuln/detail/CVE-2015-7985
https://www.zdnet.com/article/researcher-publishes-second-steam-zero-day-after-getting-banned-on-valves-bug-bounty-program/
https://www.theregister.com/2018/11/09/valve_steam_key_vulnerability/
Among others...
Please don't spread false claims.
it's not cool.
As for a game with RCE, certainly there are other ways to fix it. Besides have Valve do it.
Whether or not they take security seriously is debatable; but the remainder of what BlueCanine posted is verifiable via public news posts. I already cited the coverage ZDNet did of the case. Look for my prior post in this thread.
The particular exploit they're referring to was a trivially exploitable privilege escalation that would instantly give any malware full system access. And yes; HackerOne - the org running Valve's bug bounty program - did kick the researcher who tried to report this to them after he resubmitted the same report to them a second time over, trying to explain its seriousness.
Valve and HackerOne initially literally told said researcher they didn't consider it a security vulnerability under the bounty program, because it required a machine to already have malware on it such that it could execute code with local account permissions. They didn't consider the elevation from a limited user account to full system and kernel access, a security hole.
Which, well.. that does kind of go towards the claim that Valve doesn't take security very seriously, now doesn't it?
I mean, none of that makes sense ever, because no one is dumb enough to claim those things.
LOL.
Everyone who would not take that as a serious issue would be fired, and then fired out of a canon into a volcano.
Yet, it still happened.
Go look for the case details.
Because the researcher went public with the exploit, Valve's hand was forced and they had to fix it after all:
https://store.steampowered.com/oldnews/53319