Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r56f-c7p9-h5jg

Опубликовано: 20 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7

Описание

Kaillera Server version 0.86 is vulnerable to a denial-of-service condition triggered by sending a malformed UDP packet after the initial handshake. Once a client sends a valid HELLO0.83 packet and receives a response, any subsequent malformed packet causes the server to crash and become unresponsive. This flaw stems from improper input validation in the server’s UDP packet handler, allowing unauthenticated remote attackers to disrupt service availability.

Kaillera Server version 0.86 is vulnerable to a denial-of-service condition triggered by sending a malformed UDP packet after the initial handshake. Once a client sends a valid HELLO0.83 packet and receives a response, any subsequent malformed packet causes the server to crash and become unresponsive. This flaw stems from improper input validation in the server’s UDP packet handler, allowing unauthenticated remote attackers to disrupt service availability.

EPSS

Процентиль: 98%
0.47259
Средний

8.7 High

CVSS4

Дефекты

CWE-20

Связанные уязвимости

nvd
6 месяцев назад

Kaillera Server version 0.86 is vulnerable to a denial-of-service condition triggered by sending a malformed UDP packet after the initial handshake. Once a client sends a valid HELLO0.83 packet and receives a response, any subsequent malformed packet causes the server to crash and become unresponsive. This flaw stems from improper input validation in the server’s UDP packet handler, allowing unauthenticated remote attackers to disrupt service availability.

EPSS

Процентиль: 98%
0.47259
Средний

8.7 High

CVSS4

Дефекты

CWE-20