Jump to content

服务器请运行漏洞修补工具


Su-33

Recommended Posts

为了测试本漏洞,我在日本服务器远程关闭

服务器攻击测试:

日本服务器(看名字)

服务攻击日志:

- target 220.111.146.173:20110

- request informations

statusResponse

game_version: sof2mp-1.02

sv_keywords: SOF2FULL

challenge: xxx

sv_pure: 1

g_gametype: dm

scorelimit: 200

timelimit: 10

dmflags: 0

fraglimit: 20

g_needpass: 0

sv_privateClients: 0

sv_hostname: ^3BANZAI SOLDIER - Japan

sv_maxclients: 50

sv_punkbuster: 0

sv_maxRate: 5000

sv_minPing: 0

sv_maxPing: 350

sv_floodProtect: 1

sv_allowAnonymous: 0

sv_allowDownload: 1

g_maxGameClients: 0

g_friendlyfire: 1

version: SOF2MP GOLD V1.03 win-x86 Nov 5 2002

protocol: 2004

mapname: mp_pra1

.Configured By: SOF2 Runner: December 06 2003 beta 1.0.6

.Online Since: 16/06/2005 1:04:11

gamename: sof2mp

Config File: SOF2

Admin: server_games

Location: japan

URL: http://banzaisoldier.dyndns.org

IRC: #SOF2 on irc.enterthegame.com

g_available: 22222222222222222222

redscore: 0

bluescore: 0

- send BOOM packet (1212 bytes)

- no reply received, it is probably crashed

- check server

Server IS vulnerable!!!

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

访客
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • 创建新的...