SWAT 4 1.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via a (1) VERIFYCONTENT or (2) GAMECONFIG command sent to the server before user session initialization, which triggers a NULL pointer dereference; or (3) a GAMESPYRESPONSE command followed by a long RS string.
References
Configurations
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/swat4x-adv.txt - Exploit | |
References | () http://aluigi.org/fakep/unrealfp.zip - Exploit | |
References | () http://secunia.com/advisories/31158 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/30299 - Exploit | |
References | () http://www.vupen.com/english/advisories/2008/2149/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43901 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43902 - |
Information
Published : 2008-07-24 17:41
Updated : 2024-11-21 00:48
NVD link : CVE-2008-3286
Mitre link : CVE-2008-3286
CVE.ORG link : CVE-2008-3286
JSON object : View
Products Affected
sierra
- swat_4
CWE
CWE-20
Improper Input Validation