what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 35809

Secunia Security Advisory 35809
Posted Jul 22, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in America's Army, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 602b5cbd8a084d100c189cbc2864cb49d749500c791096cb52a0fb0fc17bab22

Secunia Security Advisory 35809

Change Mirror Download
----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability
intelligence source on the market.

Implement it through Secunia.

For more information visit:
http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com

----------------------------------------------------------------------

TITLE:
America's Army Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA35809

VERIFY ADVISORY:
http://secunia.com/advisories/35809/

DESCRIPTION:
Some vulnerabilities have been reported in America's Army, which can
be exploited by malicious people to cause a DoS (Denial of Service).

1) An error in the handling of multiple players joining the server
can be exploited to cause a crash by sending multiple specially
crafted packets to port 8777/UDP.

2) An error in the handling of queries can be exploited to cause the
server to enter a loop of sending error messages by a specially
crafted packet sent to port 39300/UDP (or 9002/UDP in LAN mode)
resulting in high network traffic and high CPU load.

3) An NULL-pointer dereference error in the processing of certain
data types (type 0x07) can be exploited to cause a crash by sending
specially crafted packets to port 39300/UDP (or 9002/UDP in LAN
mode).

4) An error in the processing of string size values can be exploited
to cause a crash by sending a specially crafted packet containing a
negative string size value to port 39300/UDP (or 9002/UDP in LAN
mode).

5) An error in the processing of certain data fields can potentially
be exploited to cause a crash by sending a specially crafted packet
containing a negative fragment number value to port 39300/UDP (or
9002/UDP in LAN mode).

The vulnerabilities are reported in version 3.0.5. Other versions may
also be affected.

SOLUTION:
Only play multi-player games on trusted, local networks.

PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma

ORIGINAL ADVISORY:
http://aluigi.altervista.org/adv/aa3boh-adv.txt
http://aluigi.altervista.org/adv/aa3mah-adv.txt
http://aluigi.altervista.org/adv/aa3pwood-adv.txt
http://aluigi.altervista.org/adv/aa3memset-adv.txt

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close