Image Space rFactor 1.250 and earlier allows remote attackers to cause a denial of service (daemon crash) via (1) an ID 0x30 packet, (2) an ID 0x38 packet, and an invalid 13-bit integer in (3) an ID 0x60 packet and (4) an ID 0x68 packet; and a denial of service (UDP port block) via (5) an ID 0x20 packet and (6) an ID 0x28 packet.
Link | Tags |
---|---|
http://forum.racesimcentral.com/showthread.php?t=298659 | |
http://www.securityfocus.com/bid/25358 | vdb entry |
http://securityreason.com/securityalert/3037 | third party advisory |
http://aluigi.org/poc/rfactorx.zip | exploit |
http://www.rfactor.net/?page=news_09-26_1255 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36095 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36094 | vdb entry |
http://www.securityfocus.com/archive/1/480921/100/200/threaded | mailing list |
http://www.securityfocus.com/archive/1/480591/100/200/threaded | mailing list |
http://www.securityfocus.com/archive/1/477023/100/0/threaded | mailing list |
http://secunia.com/advisories/26526 | third party advisory vendor advisory |