==================================================================================== # # this file has been created for the Lame patcher program available for both *nix # and Windows platforms. # You need this program for continuing the patching of your files: # # http://aluigi.org/mytoolz.htm#lpatch # # Quick step-by-step # - launch lpatch.exe # - select this codmsgfix.lpatch file # - read the message windows and click yes # - select the file (usually executables or dlls) to patch # - read the message windows to know if everything has been patched correctly # - test your game TITLE Call of Duty <= 1.5b / UO <= 1.51b and Call of Duty 2 1.0 buffer-overrun fix 0.1 (Windows) by Luigi Auriemma e-mail: aluigi@autistici.org web: aluigi.org INTRO This unofficial patch is referred to the bug described here: . . http://aluigi.org/adv/codmsgboom-adv.txt . If you are unsure if your server is vulnerable please use the proof-of-concept provided there. . This patch searchs for a byte (yes, only one) to modify in any given executable of Call of Duty / UO / Call of Duty 2 and old versions too. . The patch consists in reducing the threshold used by the server to drop the client strings from 1024 to 896 avoiding the sprintf() buffer-overflow. . The dll to patch is game_mp_x86.dll for CoD or uo_game_mp_x86.dll for CoDUO. On CoD2 you simply need to select the CoD2MP_s.exe file. If you have some mods installed you need to patch ALL their dlls. They are located in the .pk3 files so you need to extract the needed dll from the zipped pk3 files of your mods and then re-zip them... anyway I think you already know these things better than me. If you use only the normal game without mods you need to patch only the dll in your Main folder (in case of problems the dll in the pak*.pk3 with the higher number). FILE *game_mp_x86.dll;CoD2MP_s.exe BYTES_ORIGINAL 8D 14 38 ; lea edx, dword ptr [eax+edi] 81 FA FF 03 00 00 ; cmp edx, 000003FF 7D ?? ; jge 2001EBE2 BYTES_PATCH ?? ?? ?? ?? ?? 7F 03 00 00 ; cmp edx, 0000037F ?? ?? ====================================================================================