ID CVE-2005-0371 Type cve Reporter NVD Modified 2016-10-17T23:11:09
Description
Armagetron 0.2.6.0 and earlier and Armagetron Advanced 0.2.7.0 and earlier allow remote attackers to cause a denial of service (freeze) via a large number of player connections that do not send any data.
{"id": "CVE-2005-0371", "bulletinFamily": "NVD", "title": "CVE-2005-0371", "description": "Armagetron 0.2.6.0 and earlier and Armagetron Advanced 0.2.7.0 and earlier allow remote attackers to cause a denial of service (freeze) via a large number of player connections that do not send any data.", "published": "2005-05-02T00:00:00", "modified": "2016-10-17T23:11:09", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0371", "reporter": "NVD", "references": ["http://marc.info/?l=bugtraq&m=110811699206052&w=2"], "cvelist": ["CVE-2005-0371"], "type": "cve", "lastseen": "2017-04-18T15:50:54", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:armagetron:armagetron:0.2.6.0", "cpe:/a:armagetron:armagetron:0.2.5.2", "cpe:/a:armagetron:armagetron_advanced:0.2.7.0"], "cvelist": ["CVE-2005-0371"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "Armagetron 0.2.6.0 and earlier and Armagetron Advanced 0.2.7.0 and earlier allow remote attackers to cause a denial of service (freeze) via a large number of player connections that do not send any data.", "edition": 1, "hash": "449c452ba531b1885d91018627eddc5f8eb599bdefee012f26237a8f9771f04b", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "44f3f972f1219e5a5130d74f050ce136", "key": "published"}, {"hash": "38769c125d2ee98fc5cc25b0a32241da", "key": "references"}, {"hash": "09e7c5bb369c8afdff237e0b9b61ed75", "key": "cvelist"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "acf5e6cbdcf4557a9e0fdf93ca1636e1", "key": "cpe"}, {"hash": "b889ec5f1bfa99a2125bc754f28936c5", "key": "description"}, {"hash": "4f1589de83593f9ed810c2450d59a924", "key": "href"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "28dc0b61bca23f66612862c1c67341a8", "key": "title"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}, {"hash": "d52c3e274b31ea0d464098dadf139fd6", "key": "modified"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0371", "id": "CVE-2005-0371", "lastseen": "2016-09-03T05:07:12", "modified": "2008-09-05T16:46:06", "objectVersion": "1.2", "published": "2005-05-02T00:00:00", "references": ["http://marc.theaimsgroup.com/?l=bugtraq&m=110811699206052&w=2"], "reporter": "NVD", "scanner": [], "title": "CVE-2005-0371", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T05:07:12"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "acf5e6cbdcf4557a9e0fdf93ca1636e1"}, {"key": "cvelist", "hash": "09e7c5bb369c8afdff237e0b9b61ed75"}, {"key": "cvss", "hash": "84813b1457b92d6ba1174abffbb83a2f"}, {"key": "description", "hash": "b889ec5f1bfa99a2125bc754f28936c5"}, {"key": "href", "hash": "4f1589de83593f9ed810c2450d59a924"}, {"key": "modified", "hash": "9fdc4b99d8beb7238fb3654fc0137860"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "44f3f972f1219e5a5130d74f050ce136"}, {"key": "references", "hash": "1d58221d5a5ad463a588ec4a1113ee23"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "28dc0b61bca23f66612862c1c67341a8"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "7e53dddd04dcf1f232246cee70299de0da4395c5d1d61975d4a3678abc281f22", "viewCount": 0, "objectVersion": "1.2", "cpe": ["cpe:/a:armagetron:armagetron:0.2.6.0", "cpe:/a:armagetron:armagetron:0.2.5.2", "cpe:/a:armagetron:armagetron_advanced:0.2.7.0"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": [], "enchantments": {"score": {"value": 5.0, "vector": "NONE", "modified": "2017-04-18T15:50:54"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:13726"]}], "modified": "2017-04-18T15:50:54"}, "vulnersScore": 5.0}}
{"osvdb": [{"lastseen": "2017-04-28T13:20:09", "bulletinFamily": "software", "description": "## Solution Description\nUpgrade to version 0.2.7.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://armagetron.sourceforge.net\nVendor URL: http://armagetronad.sourceforge.net\nVendor Specific News/Changelog Entry: http://sourceforge.net/project/shownotes.php?release_id=311403&group_id=110997\nSecurity Tracker: 1013180\n[Secunia Advisory ID:14234](https://secuniaresearch.flexerasoftware.com/advisories/14234/)\n[Related OSVDB ID: 13725](https://vulners.com/osvdb/OSVDB:13725)\n[Related OSVDB ID: 13723](https://vulners.com/osvdb/OSVDB:13723)\n[Related OSVDB ID: 13724](https://vulners.com/osvdb/OSVDB:13724)\nOther Advisory URL: http://aluigi.altervista.org/adv/atron-adv.txt\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-02/0146.html\n[CVE-2005-0371](https://vulners.com/cve/CVE-2005-0371)\n", "modified": "2005-02-10T00:00:00", "published": "2005-02-10T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:13726", "id": "OSVDB:13726", "title": "Armagetron Fake Player Saturation User Lockout", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}]}