Vulnerability Name:

CVE-2002-0964 (CCN-9412)

Assigned:2002-06-20
Published:2002-06-20
Updated:2008-09-05
Summary:Half-Life Server 1.1.1.0 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via multiple responses to the initial challenge with different cd_key values, which reaches the player limit and prevents other players from connecting until the original responses have timed out.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: BUGTRAQ
Type: UNKNOWN
20020620 Half-life fake players bug

Source: CCN
Type: BugTraq Mailing List, Thu Jun 20 2002 - 14:00:03 CDT
Half-life fake players bug

Source: CCN
Type: BugTraq Mailing List, Mon Jun 24 2002 - 14:47:34 CDT
Re: Half-life fake players bug (update)

Source: MITRE
Type: CNA
CVE-2002-0964

Source: XF
Type: Vendor Advisory
halflife-mulitple-player-dos(9412)

Source: CCN
Type: OSVDB ID: 5001
Half-Life Server cd_key DoS

Source: BID
Type: Vendor Advisory
5076

Source: CCN
Type: BID-5076
Half-Life Server New Player Flood Denial Of Service Vulnerability

Source: XF
Type: UNKNOWN
halflife-multiple-player-dos(9412)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:valve_software:half-life:1.1.0.4:*:linux:*:*:*:*:*
  • OR cpe:/a:valve_software:half-life:1.1.0.4:*:windows:*:*:*:*:*
  • OR cpe:/a:valve_software:half-life:1.1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:valve_software:half-life:1.1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:valve_software:half-life:1.1.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:valve_software:half-life_dedicated_server:*:*:*:*:*:*:*:* (Version <= 3.1)
  • OR cpe:/a:valve_software:half-life_dedicated_server:3.1.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    valve_software half-life 1.1.0.4
    valve_software half-life 1.1.0.4
    valve_software half-life 1.1.0.8
    valve_software half-life 1.1.0.9
    valve_software half-life 1.1.1.0
    valve_software half-life dedicated server *
    valve_software half-life dedicated server 3.1.3