Close Menu
  • Latest
  • Help Support Independent Journalism
  • Gaming
    • All Gaming
    • Nintendo
    • PlayStation
    • Xbox
    • PC Gaming
    • Card & Tabletop
    • VR
  • Features
    • Editorials
    • Interviews
    • The Anime Pulse
  • Guides
  • Entertainment
    • All Entertainment
    • Anime & Animation
    • Movies and TV
    • Books
    • Manga & Comics
    • Toys
    • Geek
    • Culture
  • Previews
  • Reviews
    • All Reviews
    • Video Game
    • Anime & Animation
    • Movie & TV
    • Comic Book & Manga
    • Tech & Gear
    • Food
    • Book
    • Toys
    • Tabletop and Card Game
  • Podcasts
    • A-01 Podcast
    • Nintendo Entertainment Podcast
    • Spectator Mode Podcast
  • Contact Us
X (Twitter) YouTube RSS Bluesky Discord
We need all your money! Please help support The Outerhaven
X (Twitter) Instagram YouTube Bluesky Discord
The OuterhavenThe Outerhaven
  • Latest
  • Features
  • Guides
  • Previews
  • Reviews
    • Video Game Reviews
    • Anime & Animation Reviews
    • Comic Book & Manga Reviews
    • Films & TV Reviews
    • Tech Reviews
    • Tabletop and Card Game Reviews
    • Toy Reviews
  • Gaming
    • PlayStation
    • Nintendo
    • Xbox
    • PC Gaming
    • Retro Gaming
    • Tabletop
    • Virtual Reality
  • Entertainment
    • Anime & Animation
    • Comic Books & Manga
    • Films & TV
    • Original English Light Novels DB
    • OELN DB
    • Culture
    • Books
    • Toys
  • Tech
  • Podcasts
    • A-01 Podcast
    • Nintendo Entertainment Podcast
    • Spectator Mode Podcast
The OuterhavenThe Outerhaven
Home»News»Gaming News»All Blizzard Games Were Suspectible To A Vulnerbility

All Blizzard Games Were Suspectible To A Vulnerbility

By Keith MitchellJanuary 22, 2018

It’s all fixed now, thankfully

Blizzard Entertainment Logo

With Meltdown and Spectre, fresh on our minds, things couldn’t get any worse. Right? Well, it seems another issue has been brought to our attention and this issue affected ALL of Blizzard’s games on the PC. Brought to light by Tavis Ormandy, a vulnerability researcher over at Google, has documented a vulnerability that could allow anyone to send commands to Blizzard Update Agent. Now anyone familiar with the agent, you know that this is installed with the Blizzard Launcher. And that this is a required tool for installing and updating all Blizzard titles on the PC.

All Blizzard games (World of Warcraft, Overwatch, Diablo III, Starcraft II, etc.) were vulnerable to DNS rebinding vulnerability allowing any website to run arbitrary code. 🎮 https://t.co/ssKyxfkuZo

— Tavis Ormandy (@taviso) January 22, 2018

Pretty scary when there are over 500 million active users running this application. And this isn’t a proof of concept, as Tavis was able to test out the exploit. He goes on to example the vulnerability and demonstrates it here. Keep in mind that this was back in December 2017.

All blizzard games are installed alongside a shared tool called “Blizzard Update Agent”, investor.activision.com claims they have “500 million monthly active users”, who presumably all have this utility installed.

The agent utility creates an JSON RPC server listening on localhost port 1120, and accepts commands to install, uninstall, change settings, update and other maintenance related options. Blizzard use a custom authentication scheme to verify the rpc’s are from a legitimate source.

This endpoint is permitted without authentication, but all other requests must have a valid “Authorization” header with the token in that response. As with all HTTP RPC schemes like this, a website can send requests to the daemon with XMLHttpRequest(), but I think the theory is they will be ignored because requests must prove they can read and write the authorization property.

I don’t think this design will work because of an attack called “dns rebinding”. Any website can simply create a dns name that they are authorized to communicate with, and then make it resolve to localhost.

To be clear, this means that *any* website can send privileged commands to the agent.

He goes on to state that he did contact someone at Blizzard and provided all the information that he discovered. So it should be an open and closed case, right? Well, since he reported the vulnerability, Blizzard hadn’t been in contact with Tavis. You’d think that one of the biggest gaming companies on the planet would love to know about something such as this. Or even stay in contact with the person who pointed this out.  

Blizzard were replying to emails, but stopped communicating on December 22nd.

However, as of today, Blizzard did appear to patch the vulnerability about 6 hours ago. According to Tavis, what Blizzard did was completely different than what he recommended. And instead was a bit uglier. Of course, Tavis wasn’t too thrilled about the entire situation.

Blizzard are no longer replying to any enquiries, and it looks like in version 5996 the Agent now has been silently patched with a bizarre solution.

Their solution appears to be to query the client command line, get the 32-bit FNV-1a string hash of the exename and then check if it’s in a blacklist. I proposed they whitelist Hostnames, but apparently that solution was too elegant and simple.

I’m not pleased that Blizzard pushed this patch without notifying me, or consulted me on this.

Shortly after Tavis posted this update, Blizzard chimes in and states that they’ll be in contact with Tavis regarding the fix. They even mention that the original fix he recommended is being worked on.

Blizzard here. We have a more robust Host header whitelist fix in QA now and will deploy soon. The executable blacklisting code is actually old and wasn’t intended to be a resolution to this issue. We’re in touch with Tavis to avoid miscommunication in the future.

I have to say I agree with Tavis. I don’t like the way Blizzard handled this. Not to mention that this vulnerability was in the wild for how long? While I do applaud Blizzard for correcting the problem, they should have stayed in contact with Tavis the moment he pointed it out. As for Tavis, huge thanks from a fellow Blizzard fan, for bringing light to this. I’m one of those 500 million users. The last thing I needed was for someone to set up a rogue website and run command the initiates downloads to my PC, or worse, even sending a command to wipe my files.

Oh, and Tavis says he plans on for other titles and applications that have a high amount of users. Way to stay vigilant!

I plan to look at other games with very high install bases (100M+) in the coming weeks.

— Tavis Ormandy (@taviso) January 22, 2018

blizzard Expliot GOogle Tavis Ormandy Vulnerbility
Keith Mitchell - Headshot-PS_Gear_400x400
Keith Mitchell
  • X (Twitter)
  • LinkedIn

Keith D. Mitchell is the founder and Editor-in-Chief of The Outerhaven, where he has been covering video games and technology for more than 14 years. A lifelong PC gamer, he began building PCs at just eight years old and still loves talking about hardware as much as playing games. His passion for challenging experiences has made him a devoted Soulslike fan, having beaten nearly every FromSoftware release. Keith regularly attends major gaming and technology events to bring firsthand coverage to readers, and continues to enjoy writing about the games and gear that shaped his love for the industry.

Check out these posts

Pokemon Legends Z-A Dev Team Was Larger Than You Think

Angry Birds 2 Is Going To Space

Sonic Racing CrossWorlds Creative Director Reveals Uncertainty Around Ichiban Inclusion

Leave a Reply

Cancel reply

You must be logged in to post a comment.

Most Recent

Pokemon Legends Z-A Dev Team Was Larger Than You Think

October 20, 2025

Manga Review: Gals Can’t Be Kind to Otaku?! Vol. 1

October 19, 2025

Manga Review: Dead Mount Death Play Vol. 14

October 19, 2025

The Best Matches From AEW WrestleDream 2025

October 19, 2025

Angry Birds 2 Is Going To Space

October 18, 2025

Manga Review: Astro Royale Vol. 2

October 18, 2025
About Us • Our Team • Contact Us • Privacy Policy • Review Policy • Ethics Policy 
Work With Us • Metacritic Reviews • OpenCritic Reviews• CriticDB Reviews
Copyright @2025 The Outerhaven Productions

Type above and press Enter to search. Press Esc to cancel.