ID CVE-2004-1395 Type cve Reporter NVD Modified 2017-07-10T21:30:59
Description
The Lithtech engine, as used in (1) Contract Jack 1.1 and earlier, (2) No one lives forever 2 1.3 and earlier, (3) Tron 2.0 1.042 and earlier, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote attackers to cause a denial of service (connection refused) via a UDP packet that causes recvfrom to generate a return code that causes the listening loop to exit, as demonstrated using zero byte packets or packets between 8193 and 12280 bytes, which result in conditions that are not "Operation would block."
{"id": "CVE-2004-1395", "bulletinFamily": "NVD", "title": "CVE-2004-1395", "description": "The Lithtech engine, as used in (1) Contract Jack 1.1 and earlier, (2) No one lives forever 2 1.3 and earlier, (3) Tron 2.0 1.042 and earlier, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote attackers to cause a denial of service (connection refused) via a UDP packet that causes recvfrom to generate a return code that causes the listening loop to exit, as demonstrated using zero byte packets or packets between 8193 and 12280 bytes, which result in conditions that are not \"Operation would block.\"", "published": "2004-12-31T00:00:00", "modified": "2017-07-10T21:30:59", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1395", "reporter": "NVD", "references": ["http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038095.html", "http://www.securityfocus.com/bid/11902", "https://exchange.xforce.ibmcloud.com/vulnerabilities/18456", "http://marc.info/?l=bugtraq&m=110297515500671&w=2", "http://aluigi.altervista.org/adv/lithsock-adv.txt", "http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/029932.html"], "cvelist": ["CVE-2004-1395"], "type": "cve", "lastseen": "2017-07-11T11:14:33", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:monolith_productions:no_one_lives_forever_2:1.0.004", "cpe:/a:monolith_productions:tron:2.0.1.42", "cpe:/a:monolith_productions:tron:2.0.1.0", "cpe:/a:monolith_productions:contract_jack:1.1", "cpe:/a:monolith_productions:no_one_lives_forever_2:1.3"], "cvelist": ["CVE-2004-1395"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "The Lithtech engine, as used in (1) Contract Jack 1.1 and earlier, (2) No one lives forever 2 1.3 and earlier, (3) Tron 2.0 1.042 and earlier, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote attackers to cause a denial of service (connection refused) via a UDP packet that causes recvfrom to generate a return code that causes the listening loop to exit, as demonstrated using zero byte packets or packets between 8193 and 12280 bytes, which result in conditions that are not \"Operation would block.\"", "edition": 1, "hash": "41f6888988c6288501d42a3681fa61d738bdccef21b1d49494c9bf3875f421c4", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "eae62abac8aaf86ec877ef3854a77e18", "key": "cvelist"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "f816fa142784bcf3b9ece8ef459120c9", "key": "title"}, {"hash": "8d01b3f7405442a63e5c8249be351108", "key": "published"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "025b4d868b6f0d4a63c660764808b4a1", "key": "cpe"}, {"hash": "2f97ef8d3182e1ee615a153c16a9e7a1", "key": "modified"}, {"hash": "0d0b645164d8c45af742d349a7316663", "key": "references"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}, {"hash": "bf096d52383f7daddbc3c9f19047da33", "key": "description"}, {"hash": "de5d060407e926dad029c44307a108ad", "key": "href"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1395", "id": "CVE-2004-1395", "lastseen": "2016-09-03T04:36:23", "modified": "2008-09-05T16:41:14", "objectVersion": "1.2", "published": "2004-12-31T00:00:00", "references": ["http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038095.html", "http://marc.theaimsgroup.com/?l=bugtraq&m=110297515500671&w=2", "http://www.securityfocus.com/bid/11902", "http://aluigi.altervista.org/adv/lithsock-adv.txt", "http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/029932.html", "http://xforce.iss.net/xforce/xfdb/18456"], "reporter": "NVD", "scanner": [], "title": "CVE-2004-1395", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T04:36:23"}, {"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:monolith_productions:no_one_lives_forever_2:1.0.004", "cpe:/a:monolith_productions:tron:2.0.1.42", "cpe:/a:monolith_productions:tron:2.0.1.0", "cpe:/a:monolith_productions:contract_jack:1.1", "cpe:/a:monolith_productions:no_one_lives_forever_2:1.3"], "cvelist": ["CVE-2004-1395"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "The Lithtech engine, as used in (1) Contract Jack 1.1 and earlier, (2) No one lives forever 2 1.3 and earlier, (3) Tron 2.0 1.042 and earlier, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote attackers to cause a denial of service (connection refused) via a UDP packet that causes recvfrom to generate a return code that causes the listening loop to exit, as demonstrated using zero byte packets or packets between 8193 and 12280 bytes, which result in conditions that are not \"Operation would block.\"", "edition": 2, "enchantments": {}, "hash": "ec11587d80a846a0f7f898f4dace203c98bf8051eff9a677685b3ee52c8d1386", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "eae62abac8aaf86ec877ef3854a77e18", "key": "cvelist"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "b8678dd7a4122c44db603909d132d7fd", "key": "references"}, {"hash": "f816fa142784bcf3b9ece8ef459120c9", "key": "title"}, {"hash": "8d01b3f7405442a63e5c8249be351108", "key": "published"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "025b4d868b6f0d4a63c660764808b4a1", "key": "cpe"}, {"hash": "01669916ad61c089bd0fa02333f49fff", "key": "modified"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}, {"hash": "bf096d52383f7daddbc3c9f19047da33", "key": "description"}, {"hash": "de5d060407e926dad029c44307a108ad", "key": "href"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1395", "id": "CVE-2004-1395", "lastseen": "2017-04-18T15:50:27", "modified": "2016-10-17T22:53:55", "objectVersion": "1.2", "published": "2004-12-31T00:00:00", "references": ["http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038095.html", "http://www.securityfocus.com/bid/11902", "http://marc.info/?l=bugtraq&m=110297515500671&w=2", "http://aluigi.altervista.org/adv/lithsock-adv.txt", "http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/029932.html", "http://xforce.iss.net/xforce/xfdb/18456"], "reporter": "NVD", "scanner": [], "title": "CVE-2004-1395", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 2, "lastseen": "2017-04-18T15:50:27"}], "edition": 3, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "025b4d868b6f0d4a63c660764808b4a1"}, {"key": "cvelist", "hash": "eae62abac8aaf86ec877ef3854a77e18"}, {"key": "cvss", "hash": "84813b1457b92d6ba1174abffbb83a2f"}, {"key": "description", "hash": "bf096d52383f7daddbc3c9f19047da33"}, {"key": "href", "hash": "de5d060407e926dad029c44307a108ad"}, {"key": "modified", "hash": "5990b3050df81bd7d845477789dd93f6"}, {"key": "published", "hash": "8d01b3f7405442a63e5c8249be351108"}, {"key": "references", "hash": "0706283a029b9400fe36e525acdf6c56"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "f816fa142784bcf3b9ece8ef459120c9"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "551c53b524d870caff08e7e7198fd4ebcb55b17c3e5e7e32a7e87ff31867da35", "viewCount": 0, "enchantments": {"vulnersScore": 5.0}, "objectVersion": "1.3", "cpe": ["cpe:/a:monolith_productions:no_one_lives_forever_2:1.0.004", "cpe:/a:monolith_productions:tron:2.0.1.42", "cpe:/a:monolith_productions:tron:2.0.1.0", "cpe:/a:monolith_productions:contract_jack:1.1", "cpe:/a:monolith_productions:no_one_lives_forever_2:1.3"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"result": {"osvdb": [{"id": "OSVDB:12363", "type": "osvdb", "title": "Lithtech Engine Malformed UDP Packet DoS", "description": "# No description provided by the source\n\n## References:\nVendor URL: http://www.lithtech.com\n[Secunia Advisory ID:13446](https://secuniaresearch.flexerasoftware.com/advisories/13446/)\n[Secunia Advisory ID:17317](https://secuniaresearch.flexerasoftware.com/advisories/17317/)\nOther Advisory URL: http://aluigi.altervista.org/adv/lithsock-adv.txt\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0262.html\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0465.html\n[CVE-2004-1395](https://vulners.com/cve/CVE-2004-1395)\n", "published": "2004-12-13T08:05:35", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:12363", "cvelist": ["CVE-2004-1395"], "lastseen": "2017-04-28T13:20:07"}], "exploitdb": [{"id": "EDB-ID:683", "type": "exploitdb", "title": "Lithtech Engine new protocol - Socket Unreacheable DoS", "description": "Lithtech Engine (new protocol) Socket Unreacheable DoS. CVE-2004-1395. Dos exploit for windows platform", "published": "2004-12-13T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/683/", "cvelist": ["CVE-2004-1395"], "lastseen": "2016-01-31T12:40:26"}]}}