Yes, this unfortunately impacted a lot of European CS:S servers (L4D(2) and other engines will forever be compromised). Based on the scope, everything the server's user was running as is compromised. However, the running guess is that people were still only after quick wins; such as changing the server hostname and printing garbage.
Thanks, Kyle. On Mon, Apr 21, 2014 at 7:14 AM, Valentin G. <[email protected]> wrote: > So was this used to obtain rcon passwords in other games such as TF2? > > On Sat, Apr 19, 2014 at 9:45 PM, Tyrone <[email protected]> wrote: >> The exploit works on all source based games according to Garry. >> >> >> On Fri, Apr 18, 2014 at 11:11 PM, wickedplayer494 <[email protected] >>> wrote: >> >>> http://facepunch.com/showthread.php?t=1386818 >>> >>> If your clients are complaining about "*cough*" spam or similar through >>> Steam chat, this is what's causing it. It may be wise to just completely >>> kill your server until the Facepunch folks release an update to fix this >>> (even though it's 3 AM in the UK), as it's rumored that even if rcon/client >>> uploads are disabled, it'll still work. >>> >>> _______________________________________________ >>> To unsubscribe, edit your list preferences, or view the list archives, >>> please visit: >>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux >>> >> _______________________________________________ >> To unsubscribe, edit your list preferences, or view the list archives, >> please visit: >> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, please > visit: > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux

