Secunia Security Advisory - Some vulnerabilities have been reported in America's Army, which can be exploited by malicious people to cause a DoS (Denial of Service).
602b5cbd8a084d100c189cbc2864cb49d749500c791096cb52a0fb0fc17bab22
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
America's Army Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA35809
VERIFY ADVISORY:
http://secunia.com/advisories/35809/
DESCRIPTION:
Some vulnerabilities have been reported in America's Army, which can
be exploited by malicious people to cause a DoS (Denial of Service).
1) An error in the handling of multiple players joining the server
can be exploited to cause a crash by sending multiple specially
crafted packets to port 8777/UDP.
2) An error in the handling of queries can be exploited to cause the
server to enter a loop of sending error messages by a specially
crafted packet sent to port 39300/UDP (or 9002/UDP in LAN mode)
resulting in high network traffic and high CPU load.
3) An NULL-pointer dereference error in the processing of certain
data types (type 0x07) can be exploited to cause a crash by sending
specially crafted packets to port 39300/UDP (or 9002/UDP in LAN
mode).
4) An error in the processing of string size values can be exploited
to cause a crash by sending a specially crafted packet containing a
negative string size value to port 39300/UDP (or 9002/UDP in LAN
mode).
5) An error in the processing of certain data fields can potentially
be exploited to cause a crash by sending a specially crafted packet
containing a negative fragment number value to port 39300/UDP (or
9002/UDP in LAN mode).
The vulnerabilities are reported in version 3.0.5. Other versions may
also be affected.
SOLUTION:
Only play multi-player games on trusted, local networks.
PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
ORIGINAL ADVISORY:
http://aluigi.altervista.org/adv/aa3boh-adv.txt
http://aluigi.altervista.org/adv/aa3mah-adv.txt
http://aluigi.altervista.org/adv/aa3pwood-adv.txt
http://aluigi.altervista.org/adv/aa3memset-adv.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------