GameSpy 3D Based Games Spoofed UDP Response Amplification DDoS

medium Nessus Plugin ID 11211

Synopsis

A game server is running on the remote host.

Description

The remote host is running a GameSpy server. This service is used to host a gaming server.

Since it uses UDP as its transport layer and sends multiple UDP packets in response to one request, an attacker can abuse it to flood a third-party host with traffic by sending a spoofed UDP packet with the IP address of their target as the source field.

Solution

Filter incoming traffic to this port or disable the service.

See Also

http://www.nessus.org/u?7d9bb249

Plugin Details

Severity: Medium

ID: 11211

File Name: gamespy_detect.nasl

Version: 1.26

Type: remote

Published: 1/22/2003

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:gamespy:gamespy_sdk_cd-key_validation_toolkit

Required KB Items: Settings/ThoroughTests

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2003-1354

BID: 6636

CWE: 119