This might be of interest since the isse at hand is fixed now. ----- Original Message ----- From: "Daniel Vogel" <[EMAIL PROTECTED]> To: "Arne Schwerdtfegger" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Saturday, September 14, 2002 11:11 PM Subject: RE: [ut2003bugs] remote denial of service in ut2003 demo
> We will address this denial of service attack shortly. > > Thanks! > > -- Daniel, Epic Games Inc. > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED]]On Behalf Of Arne > > Schwerdtfegger > > Sent: Saturday, September 14, 2002 5:03 PM > > To: [EMAIL PROTECTED] > > Subject: [ut2003bugs] remote denial of service in ut2003 demo > > > > > > Dear sirs, > > > > It's possible to crash the client/the dedicated server by sending 1-3 > > character to udp ports 7778 or 10777. 4 characters will produce the > > following in the console: "Log: Unkown ping request command: 65". > > This can be reproduced with netcat[1] as follows: > > echo "a" | nc -u target 10777 > > > > Doing something like `cat /dev/urandom | nc -u target 7778` > > will flood the console with "Log: RecvFrom returned SOCKET_ERROR 10040" > > > > The tested platform was windows 2000 with servicepack 3, not that I think > > it matters. > > > > [1] http://www.atstake.com/research/tools/ > > -- > > Knud Erik Højgaard > > [EMAIL PROTECTED] > > > >