ID CVE-2005-1899 Type cve Reporter cve@mitre.org Modified 2016-10-18T03:23:00
Description
Rakkarsoft RakNet network library 2.33 and earlier, when released before 30 May 2005, and as used in multiple products including nFusion Elite Warriors: Vietnam, allows remote attackers to cause a denial of service (infinite loop) via a zero-byte UDP packet.
{"id": "CVE-2005-1899", "bulletinFamily": "NVD", "title": "CVE-2005-1899", "description": "Rakkarsoft RakNet network library 2.33 and earlier, when released before 30 May 2005, and as used in multiple products including nFusion Elite Warriors: Vietnam, allows remote attackers to cause a denial of service (infinite loop) via a zero-byte UDP packet.", "published": "2005-06-09T04:00:00", "modified": "2016-10-18T03:23:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1899", "reporter": "cve@mitre.org", "references": ["http://securitytracker.com/id?1014111", "http://secunia.com/advisories/15597", "http://marc.info/?l=bugtraq&m=111809312423958&w=2", "http://aluigi.altervista.org/adv/rakzero-adv.txt", "http://www.securityfocus.com/bid/13862"], "cvelist": ["CVE-2005-1899"], "type": "cve", "lastseen": "2020-12-09T19:22:20", "edition": 5, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:17125"]}], "modified": "2020-12-09T19:22:20", "rev": 2}, "score": {"value": 5.9, "vector": "NONE", "modified": "2020-12-09T19:22:20", "rev": 2}, "vulnersScore": 5.9}, "cpe": ["cpe:/a:rakkarsoft:raknet:2.33"], "affectedSoftware": [{"cpeName": "rakkarsoft:raknet", "name": "rakkarsoft raknet", "operator": "le", "version": "2.33"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:rakkarsoft:raknet:2.33:*:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:rakkarsoft:raknet:2.33:*:*:*:*:*:*:*", "versionEndIncluding": "2.33", "vulnerable": true}], "operator": "OR"}]}}
{"osvdb": [{"lastseen": "2017-04-28T13:20:13", "bulletinFamily": "software", "cvelist": ["CVE-2005-1899"], "edition": 1, "description": "## Vulnerability Description\nRaknet contains a flaw that may allow a remote denial of service. The issue is triggered when an empty UDP datagram is received by the server, and will result in loss of availability for the service.\n## Solution Description\nUpgrade to version 2.33 (05/30/2005) or higher, as it has been reported to fix this vulnerability. Note that this flaw was fixed in the 5/30/2005 release without a change in version number. An upgrade is required as there are no known workarounds.\n## Short Description\nRaknet contains a flaw that may allow a remote denial of service. The issue is triggered when an empty UDP datagram is received by the server, and will result in loss of availability for the service.\n## References:\nVendor URL: http://www.rakkarsoft.com/\nSecurity Tracker: 1014111\n[Secunia Advisory ID:15597](https://secuniaresearch.flexerasoftware.com/advisories/15597/)\nOther Advisory URL: http://aluigi.altervista.org/adv/rakzero-adv.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-06/0026.html\nISS X-Force ID: 20905\n[CVE-2005-1899](https://vulners.com/cve/CVE-2005-1899)\nBugtraq ID: 13862\n", "modified": "2005-06-05T08:17:59", "published": "2005-06-05T08:17:59", "href": "https://vulners.com/osvdb/OSVDB:17125", "id": "OSVDB:17125", "title": "RakNet Empty UDP Datagram Remote DoS", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}]}