First published: Sun Mar 25 2012(Updated: )
server/sv_main.c in Quake3 Arena, as used in ioquake3 before r1762, OpenArena, Tremulous, and other products, allows remote attackers to cause a denial of service (network traffic amplification) via a spoofed (1) getstatus or (2) rcon request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ioquake3 | 1.36+u20181222.e5da13f~dfsg-2 1.36+u20201117.d1b7ab6~dfsg-1 1.36+u20221123.70d07d9+dfsg-1 1.36+u20230706.10a45cb+dfsg-1 1.36+u20230819.b1e6ef1+dfsg-1 | |
debian/openarena | 0.8.8+dfsg-2 0.8.8+dfsg-5 0.8.8+dfsg-6 0.8.8+dfsg-7 | |
Tremulous | ||
npm | ||
ioQuake3 | <=r1761 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5077 has a denial of service vulnerability that can lead to network traffic amplification, affecting the availability of the service.
To fix CVE-2010-5077, upgrade to versions of ioquake3, OpenArena, or Tremulous that are not affected by this vulnerability.
Versions of ioquake3 prior to r1762 and certain versions of OpenArena and Tremulous are affected by CVE-2010-5077.
CVE-2010-5077 affects ioquake3, OpenArena, and Tremulous among other products.
Yes, CVE-2010-5077 can be exploited remotely through spoofed requests, leading to denial of service.