[DiscordArchive] well, the patch patches an instruction the exploit will go through, so it's kinda a hint.
[DiscordArchive] well, the patch patches an instruction the exploit will go through, so it's kinda a hint.
Archived author: MeFisto94 • Posted: 2024-07-28T16:49:25.943000+00:00
Original source
well, the patch patches an instruction the exploit will go through, so it's kinda a hint.
I wonder though, I thought warden in general could always push arbitrary modules (much like VAC, too) that are loaded? Or did they need to be signed?
Archived author: schlumpf • Posted: 2024-07-28T16:50:25.840000+00:00
Original source
It does not though, it just removes the exec bit for .zdata
Archived author: MeFisto94 • Posted: 2024-07-28T16:50:54.940000+00:00
Original source
ah, nice! From looking at it being a one byte, I thought it's just some JMP or something
Archived author: Bench • Posted: 2024-07-28T16:51:42.023000+00:00
Original source
Morally, good on you guys for getting the info and patch out there. Emotionally, I really wanted to know more about that exploit
Archived author: Pursche • Posted: 2024-07-28T16:51:42.497000+00:00
Original source
https://discord.com/channels/40766404101...2969627721
6 messages between Kaev removing information about how the exploit worked, until someone posted more information about it...
Archived author: schlumpf • Posted: 2024-07-28T16:54:23.412000+00:00
Original source
Oh no, I sure shouldn't have published what the open source patcher does. I am really bringing this community down with leaking information.
Archived author: Nix • Posted: 2024-07-28T16:55:15.853000+00:00
Original source
Why are you even a mod btw