[29077] in bugtraq
Re: [VSA0307] Battlefield 1942 remote DoS
daemon@ATHENA.MIT.EDU (VOID.AT Security)
Thu Feb 27 12:10:31 2003
From: "VOID.AT Security" <asdf@asdf.com>
Reply-To: asdf@asdf.com
To: bugtraq@securityfocus.com
Date: Thu, 27 Feb 2003 15:37:57 +0100
In-Reply-To: <200302261919.45756.asdf@asdf.com>
MIME-Version: 1.0
Content-Type: multipart/signed;
protocol="application/pgp-signature";
micalg=pgp-sha1;
boundary="Boundary-02=_KLiX+7nheCznmNK";
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <200302271538.02421.asdf@asdf.com>
--Boundary-02=_KLiX+7nheCznmNK
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Content-Description: signed data
Content-Disposition: inline
> Overview
> ========
>
> By sending a specially crafted packet to the bf1942-server
> remote administration port, an attacker can cause the server
> to crash.
After getting some reports, it seems that only servers
running on Windows XP are vulnerable. Can someone
confirm this?
greuff
--Boundary-02=_KLiX+7nheCznmNK
Content-Type: application/pgp-signature
Content-Description: signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQA+XiLKzxi8qAgTjUMRAthxAJ9ESFGxAeqOP0+jULNMDkwvmUWjxgCfR+zI
f2wnExb0upgy+b6iXkmOEWw=
=uu9q
-----END PGP SIGNATURE-----
--Boundary-02=_KLiX+7nheCznmNK--