Secunia Advisory SA39769
Release Date 2010-05-10
Criticality level Moderately critical
Impact DoS
Where From remote
Solution Status Unpatched
Software:Aliens vs. Predator 2.x
Description
Luigi Auriemma has reported some vulnerabilities in Aliens vs. Predator, which can be exploited by malicious people to cause a DoS (Denial of Service).
1) An error when processing 0x66 packets can be exploited to trigger a read from out-of-bounds memory and crash an affected server.
2) An error when processing 0x66 packets can be exploited to request the allocation of an overly large buffer and terminate an affected server.
3) An error when processing 0x66 packets having an insufficient size can be exploited to trigger a NULL-pointer dereference and crash an affected server.
4) An error when processing 0x0C packets having an insufficient size can be exploited to trigger a NULL-pointer dereference and crash an affected server.
5) An error when processing 0x0C packets can be exploited to trigger a read from out-of-bounds memory and crash an affected server.
Solution
Host games in trusted networks only.
Bollettino Sicurezza
Release Date 2010-05-10
Criticality level Moderately critical
Impact DoS
Where From remote
Solution Status Unpatched
Software:Aliens vs. Predator 2.x
Description
Luigi Auriemma has reported some vulnerabilities in Aliens vs. Predator, which can be exploited by malicious people to cause a DoS (Denial of Service).
1) An error when processing 0x66 packets can be exploited to trigger a read from out-of-bounds memory and crash an affected server.
2) An error when processing 0x66 packets can be exploited to request the allocation of an overly large buffer and terminate an affected server.
3) An error when processing 0x66 packets having an insufficient size can be exploited to trigger a NULL-pointer dereference and crash an affected server.
4) An error when processing 0x0C packets having an insufficient size can be exploited to trigger a NULL-pointer dereference and crash an affected server.
5) An error when processing 0x0C packets can be exploited to trigger a read from out-of-bounds memory and crash an affected server.
Solution
Host games in trusted networks only.
Bollettino Sicurezza