First published: Thu Jul 24 2008(Updated: )
SWAT 4 1.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via a (1) VERIFYCONTENT or (2) GAMECONFIG command sent to the server before user session initialization, which triggers a NULL pointer dereference; or (3) a GAMESPYRESPONSE command followed by a long RS string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sierra Swat 4 | <=1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3286 has a moderate severity level as it can lead to a denial of service through daemon crashes.
To fix CVE-2008-3286, update to a newer version of SWAT 4 that addresses this vulnerability beyond version 1.1.
CVE-2008-3286 can be exploited using the VERIFYCONTENT, GAMECONFIG, or GAMESPYRESPONSE commands sent during improper session initialization.
CVE-2008-3286 affects all versions of SWAT 4 up to and including version 1.1.
Exploitation of CVE-2008-3286 can lead to server instability, causing crashes and disrupting gameplay.