CVE-2011-10020
Severity CVSS v4.0:
HIGH
Type:
CWE-20
Input Validation
Publication date:
20/08/2025
Last modified:
22/08/2025
Description
Kaillera Server version 0.86 is vulnerable to a denial-of-service condition triggered by sending a malformed UDP packet after the initial handshake. Once a client sends a valid HELLO0.83 packet and receives a response, any subsequent malformed packet causes the server to crash and become unresponsive. This flaw stems from improper input validation in the server’s UDP packet handler, allowing unauthenticated remote attackers to disrupt service availability.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- http://kaillera.com/
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/dos/windows/games/kaillera.rb
- https://www.exploit-db.com/exploits/17460
- https://www.vulncheck.com/advisories/kaillera-server-dos-via-malformed-udp-packet
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/dos/windows/games/kaillera.rb
- https://www.exploit-db.com/exploits/17460



