Did u try the last bit that is mentioned here ?
No fix
Exist at least 2 easy work-arounds for this vulnerability:
- setting "AllowDownloads=false" in the INI file of the game.
naturally this method can't solve the problem if exist other ways
(of which I'm not aware at the moment) to exploit this vulnerability
- disabling the "!Closing" assertion (tests performed on the Windows
and Linux servers of some games), the list of the bytes to modify
with a hex editor is available here:
http://aluigi.org/patches/unrealoadfix.txt
- there is a "strange" way that has avoided the termination of the
server (and I report it here only for thoroughness) through the
enabling of the map voting (like [xVoting.xVotingHandler] and
bMapVote=True in the INI of UT2003 and UT2004)