Valve patched a 10-year remote code execution bug that could have bitten all Steam clients and allowed attackers to remotely control gamers' computers. Credit: IDG A critical bug that has existed for at least 10 years in the Steam client could have allowed attackers to remotely execute malicious code in “all 15 million active clients.” Put another way by Motherboard, 125 million Steam gamers were vulnerable to attacks in which attackers could have remotely controlled their machines.While Valve did patch the massive vulnerability, Tom Court, a security researcher at Context Information Security, released the details about the remote code execution (RCE) bug that affected all versions of the Steam gaming client.According to Court, it was “a very simple bug, made relatively straightforward to exploit due to a lack of modern exploit protections.”The flaw was a “heap corruption within the Steam client library that could be remotely triggered.” The Steam client communicated via its Steam protocol delivered on top of User Datagram Protocol (UDP) packets. Court determined that an attacker needed only to send malformed UDP packets to a gamer’s Steam client to trigger the flaw and then run malicious code on his or her computer. Although the critical bug has been lurking in all versions of the Steam client for the last decade, Court noted that Valve implemented modern ASLR exploit protections in the Steam source code last July. The addition of the security feature meant that the bug would only crash the Steam client if it was exploited. RCE, however, was still possible “in combination with a separate info-leak vulnerability.”You can see the attack in action in the video below: On the bright side, a mere eight hours after Court contacted the Valve security team in February, a fix had been pushed to the beta branch of the Steam client. The fix was pushed to the stable branch of the Steam client about a month later. On the imaginary “Context fastest-to-fix leaderboard,” Valve holds the top spot – a “welcome change from the often-lengthy back-and-forth process often encountered when disclosing to other vendors.”No indications hackers exploited the vulnerabilityValve said it has no indication that malicious attackers exploited the vulnerability.Court noted that “the vulnerable code was probably very old, but as it was otherwise in good working order, the developers likely saw no reason to go near it or update their build scripts. The lesson here is that as a developer, it is important to periodically include aging code and build systems in your reviews to ensure they conform to modern security standards, even if the actual functionality of the code has remained unchanged.”The fact that such a simple bug with such serious consequences has existed in such a popular software platform for so many years may be surprising to find in 2018 and should serve as encouragement to all vulnerability researchers to find and report more of them!If you want the nitty gritty, Court delved into the technical details in a blog post titled: “Frag Grenade! A Remote Code Execution Vulnerability in the Steam Client.” Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe