Bug 1031 - Exploit in CoD linux server
Status: RESOLVED INVALID
Alias: None
Product: Call of Duty
Classification: Unclassified
Component: Dedicated server
Version: unspecified
Hardware: PC Linux
: P1 critical
Assignee: Ryan C. Gordon
QA Contact:
URL: http://www.mynetwatchman.com/LID.asp?...
Depends on:
Blocks:
 
Reported: 2003-11-21 09:10 EST by Martijn Kruiswijk
Modified: 2003-11-24 11:45:42 EST
0 users

See Also:



Description Martijn Kruiswijk 2003-11-21 09:10:06 EST
I
Comment 1 Ryan C. Gordon 2003-11-24 10:56:54 EST
cod_lnxded doesn't bind to a TCP port at all, and I'm not aware of any exploits.
If you continue to see this, it would be helpful to know exactly what process is
binding to those TCP ports.

And you should upgrade to 1.1d, regardless.

--ryan.
Comment 2 Martijn Kruiswijk 2003-11-24 11:45:42 EST
The process that was bound to those ports is the cod_lnxded server, version 
1.0, also known as the 'leaked' version.

The system on which this is running is in a highly secured collocation in the 
Netherlands, with a zero access policy other than the game ports needed for 
our customers to play on and control their game server. All traffic to and 
from other ports is regulated (filtered) and monitored, and there are no signs 
of any compromise on that side. The detected TCP traffic therefor comes from 
the game server process.

We have upgraded to version 1.1d as soon as it was available.