Ubisoft's Uplay system contains a "serious security vulnerability" that allows malicious websites to break into your PC and control it without your knowledge. The claim, supported up by fellow IT security specialists and confirmed by Eurogamer's in-house tech-fetishists Digital Foundry, originated from Google security engineer Tavis Ormandy. The vulnerability was originally reported to be an intentional rootkit included in Ubisoft's DRM, but further investigation has concluded that Uplay just features "really bad code."
Full details of the exploit can be
found on SecLists.org's mailing list. It affects anyone who has installed a Ubisoft PC game in the past - as many as 21 titles. These include:
Assassin’s Creed IIAssassin’s Creed: BrotherhoodAssassin’s Creed: Project LegacyAssassin’s Creed RevelationsAssassin’s Creed IIIBeowulf: The GameBrothers in Arms: Furious 4Call of Juarez: The CartelDriver: San FranciscoHeroes of Might and Magic VIJust Dance 3Prince of Persia: The Forgotten SandsPure FootballR.U.S.E.Shaun White SkateboardingSilent Hunter 5: Battle of the AtlanticThe Settlers 7: Paths to a KingdomTom Clancy’s H.A.W.X. 2Tom Clancy’s Ghost Recon: Future SoldierTom Clancy’s Splinter Cell: ConvictionYour Shape: Fitness EvolvedDigital Foundry offers some guidance to gamers who have installed these games. "Anyone with a PC title installed using the UPlay system can prevent the exploit from working by disabling the UPlay browser plug-in - in theory, it's as simple as that. Stopping the browser from running the plug-in closes the backdoor, and without that crucial bridge, malicious HTML based on this exploit will not function."
Sources:
Geek,
Digital Foundry