retitle 665656 openarena-server: [CVE-2010-5077] traffic amplification
via getstatus requests
retitle 665842 tremulous: [CVE-2010-5077] traffic amplification via
getstatus requests
thanks

On 26/03/12 11:23, Simon McVittie wrote:
> It has been discovered that spoofed "getstatus" UDP requests are being
> used by attackers[0][1][2][3] to direct status responses from multiple
> Quake 3-based servers to a victim, as a traffic amplification mechanism
> for a denial of service attack on that victim.
> 
> Open-source games derived from the Quake 3 engine are typically based on
> ioquake3 [4], a popular fork of that engine. This vulnerability was
> fixed in ioquake3 svn revision 1762 (January 2010) [5] by applying a
> rate-limit to the getstatus request. Like several other known and fixed
> vulnerabilities, it is not fixed in the latest official ioquake3 release
> (1.36, April 2009).
> 
> If a CVE ID is allocated for this vulnerability, please reference
> ioquake3 r1762 prominently in any advisory.

CVE-2010-5077 has now been allocated for this.




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to