CVE-2015-4016

The client detection protocol in Valve Steam allows remote attackers to cause a denial of service (process crash) via a crafted response to a broadcast packet.
References
Link Resource
http://store.steampowered.com/news/16801/ Patch Vendor Advisory
http://www.securityfocus.com/bid/74735 Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-15-233/ Third Party Advisory VDB Entry
http://store.steampowered.com/news/16801/ Patch Vendor Advisory
http://www.securityfocus.com/bid/74735 Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-15-233/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:valvesoftware:steam_client:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:30

Type Values Removed Values Added
References () http://store.steampowered.com/news/16801/ - Patch, Vendor Advisory () http://store.steampowered.com/news/16801/ - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/74735 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/74735 - Third Party Advisory, VDB Entry
References () http://www.zerodayinitiative.com/advisories/ZDI-15-233/ - Third Party Advisory, VDB Entry () http://www.zerodayinitiative.com/advisories/ZDI-15-233/ - Third Party Advisory, VDB Entry

Information

Published : 2015-05-20 18:59

Updated : 2024-11-21 02:30


NVD link : CVE-2015-4016

Mitre link : CVE-2015-4016

CVE.ORG link : CVE-2015-4016


JSON object : View

Products Affected

valvesoftware

  • steam_client
CWE
CWE-20

Improper Input Validation