Image Space rFactor 1.250 and earlier allows remote attackers to cause a denial of service (daemon crash) via (1) an ID 0x30 packet, (2) an ID 0x38 packet, and an invalid 13-bit integer in (3) an ID 0x60 packet and (4) an ID 0x68 packet; and a denial of service (UDP port block) via (5) an ID 0x20 packet and (6) an ID 0x28 packet.
aluigi.org/poc/rfactorx.zip
forum.racesimcentral.com/showthread.php?t=298659
secunia.com/advisories/26526
securityreason.com/securityalert/3037
www.rfactor.net/?page=news_09-26_1255
www.securityfocus.com/archive/1/477023/100/0/threaded
www.securityfocus.com/archive/1/480591/100/200/threaded
www.securityfocus.com/archive/1/480921/100/200/threaded
www.securityfocus.com/bid/25358
exchange.xforce.ibmcloud.com/vulnerabilities/36094
exchange.xforce.ibmcloud.com/vulnerabilities/36095