Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Useless services >> GameSpy detection


Vulnerability Assessment Details

GameSpy detection

Vulnerability Assessment Summary
Searches for the existence of a GameSpy server

Detailed Explanation for this Vulnerability Assessment

The remote host is running a GameSpy server.

This service is used to host a gaming server.

It turns out that since these server use UDP as their transport layer, an
attacker may misuse them so that they flood a third party host, as they send
multiple UDP packets in reply to one request, by sending a spoofed
UDP packet with the IP address of their target as the source field.


A possible hacker may use this service and network connection as a mean to flood a
third party host.


Solution : Filter incoming traffic to this port, or disable this service
Network Security Threat Level: Medium
See also: http://www.pivx.com/kristovich/adv/mk001/

Networks Security ID: 6636

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison

Cables, Connectors

Cisco WS-C3650-48FS-S Catalyst 3650 48 Port PoE 4x1G Switch with PWR-C2-1025WAC
$2250.0
Cisco WS-C3650-48FS-S Catalyst 3650 48 Port PoE 4x1G Switch with PWR-C2-1025WAC pictureTP-Link 5-Port Fast Ethernet Desktop Switch
$14.06
TP-Link 5-Port Fast Ethernet Desktop Switch  pictureTP-LINK - 8-Port 10/100/1000 Mbps Gigabit Ethernet Metal Switch - Gray
$24.99
TP-LINK - 8-Port 10/100/1000 Mbps Gigabit Ethernet Metal Switch - Gray pictureForce10 754-00045-00 Blank Slot Cover CC-E3-BLNK-LC-R
$99.99
Force10 754-00045-00 Blank Slot Cover CC-E3-BLNK-LC-R picture


Discussions

No Discussions have been posted on this vulnerability.