Just ran across an article on Tom's Hardware about [url=http://www.tomshardware.com/news/valve-patches-source-sdk-vulnerability,35052.html]remote code execution in Source SDK[/url] when killing someone. It started sounding really nifty when they said it needed a "specially crafted ragdoll" to do it but reading further in the linked [url=https://oneupsecurity.com/research/remote-code-execution-in-source-games?t=r]One Up Security blog post[/url] it actually is a fairly standard buffer overrun exploit since the "ragdoll" is actually just a text string of rules (which I'll assume is behavioral). Just thought is was kinda nifty to deliver it through a game and killing someone being the trigger giving "pwning them" a whole new meaning.
Though on a more serious note it just shows that nothing is really safe and we need to be ever vigilant, especially in bounds checking.
[b][size=48][color=#800]NEVER TRUST RAW USER INPUT![/color][/size][/b]
[i]Has anyone seen my mind? It was right here...[/i]