Computer Security
[EN] securityvulns.ru no-pyccku


Counter Strike game server DoS
Published:26.11.2009
Source:
SecurityVulns ID:10420
Type:remote
Threat Level:
5/10
Description:Protocol is not protected against blind command injection, making it's possible to e.g. terminate any client's game by spoofing "quit" packet blindly.
Affected:VALVE : Counter Strike 1.6
Original documentdocumentGE Grishkovtsov, Уязвимость в работе протокола Counter-Strike (26.11.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod