The just released video game “Untitled Goose Game” has an unsafe deserialization issue that could allow an attacker to execute malicious code.
Pulse Security’s Denis Andzakovic reported that an attacker needs to leverage a victim’s saved game to take advantage of the vulnerability in the game, which was released on Sept. 20, 2019.
Goose Game used the dotnet BinaryFormatter to read and deserialize save game
files. As no SerializationBinder was specified, an attacker who can control the
save game file can exploit the deserialization process and execute arbitrary
code. This is achieved by writing out a malicious serialized object to a save
game file which is later read by Untitled Goose Game. The save game file is located
in C:Users<USER>AppDataLocalLowHouse HouseUntitled Goose
Gamesavegame0.save,” Andzakovic wrote.
The publisher House House on Oct. 7 responded three days later and had a patch issued by Oct. 22. Pulse Security waited until the this was in place before releasing its advisory.
Want to read more?
Please login or register first to view this content.