Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-0608 | First vendor Publication | 2004-12-06 |
Vendor | Cve | Last vendor Modification | 2017-07-11 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0608 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Application | 3 | |
Application | 1 | |
Application |
| 5 |
Application | 2 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Os | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200407-14 (Unreal Tournament) File : nvt/glsa_200407_14.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
7217 | Unreal Engine Secure Query Remote Overflow The Unreal Engine contains a flaw that may be exploited by a malicious user to cause a buffer overflow. The issue is triggered when a remote attacker sends an excessively long value to a game server via the GameSpy 'secure' query protocol. It is possible that the flaw may allow remote code execution or denial of service. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Unreal Tournament secure overflow attempt RuleID : 3080-community - Revision : 9 - Type : SERVER-OTHER |
2014-01-10 | Unreal Tournament secure overflow attempt RuleID : 3080 - Revision : 9 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200407-14.nasl - Type : ACT_GATHER_INFO |
2004-06-22 | Name : The remote host has an application that may arbitrary code execution on the r... File : unreal_dos.nasl - Type : ACT_DESTRUCTIVE_ATTACK |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-04 12:02:21 |
|
2021-04-22 01:02:30 |
|
2020-05-23 13:16:44 |
|
2020-05-23 00:15:50 |
|
2017-07-11 12:01:28 |
|
2016-10-18 12:01:21 |
|
2016-08-26 01:00:31 |
|
2016-04-26 12:51:27 |
|
2016-03-05 21:25:10 |
|
2016-03-05 17:24:18 |
|
2014-02-17 10:27:44 |
|
2014-01-19 21:22:14 |
|
2013-05-11 11:42:08 |
|