Fw: [ut2003bugs] remote denial of service in ut2003 demo

From: Arne Schwerdtfegger (knudat_private)
Date: Tue Sep 17 2002 - 08:23:13 PDT

  • Next message: eric.princeat_private: "The Art of Unspoofing"

    This might be of interest since the isse at hand is fixed now.
    
    ----- Original Message -----
    From: "Daniel Vogel" <vogelat_private>
    To: "Arne Schwerdtfegger" <knudat_private>; <ut2003bugsat_private>
    Sent: Saturday, September 14, 2002 11:11 PM
    Subject: RE: [ut2003bugs] remote denial of service in ut2003 demo
    
    
    > We will address this denial of service attack shortly.
    >
    > Thanks!
    >
    > -- Daniel, Epic Games Inc.
    >
    > > -----Original Message-----
    > > From: owner-ut2003bugsat_private
    > > [mailto:owner-ut2003bugsat_private]On Behalf Of Arne
    > > Schwerdtfegger
    > > Sent: Saturday, September 14, 2002 5:03 PM
    > > To: ut2003bugsat_private
    > > Subject: [ut2003bugs] remote denial of service in ut2003 demo
    > >
    > >
    > > Dear sirs,
    > >
    > > It's possible to crash the client/the dedicated server by sending 1-3
    > > character to udp ports 7778 or 10777. 4 characters will produce the
    > > following in the console: "Log: Unkown ping request command: 65".
    > > This can be reproduced with netcat[1] as follows:
    > > echo "a" | nc -u target 10777
    > >
    > > Doing something like `cat /dev/urandom | nc -u target 7778`
    > > will flood the console with "Log: RecvFrom returned SOCKET_ERROR 10040"
    > >
    > > The tested platform was windows 2000 with servicepack 3, not that I
    think
    > > it matters.
    > >
    > > [1] http://www.atstake.com/research/tools/
    > > --
    > > Knud Erik Højgaard
    > > knudat_private
    > >
    >
    >
    



    This archive was generated by hypermail 2b30 : Wed Sep 18 2002 - 22:23:57 PDT