header-logo
Suggest Exploit
vendor:
Red Faction
by:
SecurityFocus
7.5
CVSS
HIGH
Denial of Service
399
CWE
Product Name: Red Faction
Affected Version From: Red Faction
Affected Version To: Red Faction
Patch Exists: No
Related CWE: N/A
CPE: a:thq:red_faction
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2001

Red Faction Denial of Service

Red Faction is a commercial 3D first person shooter game developed by Volition and published by THQ. It allows up to 32 players to game across a LAN or TCP/IP. Both the Red Faction Game Server and the client communicate on port 7755 by default. If UDP packets are sent to the port Red Faction is listening on, this will cause both the Game Server and the client to crash. Sending a nmap command with the -sU flag to the port Red Faction is listening on is sufficient to crash the game.

Mitigation:

Block UDP traffic to port 7755.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/3651/info

Red Faction is a commercial 3D first person shooter game developed by Volition and published by THQ.

Red Faction allows up to 32 players to game across a LAN or TCP/IP. Both the Red Faction Game Server and the client communicate on port 7755 by default. If UDP packets are sent to the port Red Faction is listening on, this will cause both the Game Server and the client to crash. 

The following example is sufficient to crash Red Faction:

nmap -sU -p 7755 <ip>