The client detection protocol in Valve Steam allows remote attackers to cause a denial of service (process crash) via a crafted response to a broadcast packet.
References
Link | Resource |
---|---|
http://store.steampowered.com/news/16801/ | Patch Vendor Advisory |
http://www.securityfocus.com/bid/74735 | Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-15-233/ | Third Party Advisory VDB Entry |
http://store.steampowered.com/news/16801/ | Patch Vendor Advisory |
http://www.securityfocus.com/bid/74735 | Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-15-233/ | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://store.steampowered.com/news/16801/ - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/74735 - Third Party Advisory, VDB Entry | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-15-233/ - Third Party Advisory, VDB Entry |
Information
Published : 2015-05-20 18:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-4016
Mitre link : CVE-2015-4016
CVE.ORG link : CVE-2015-4016
JSON object : View
Products Affected
valvesoftware
- steam_client
CWE
CWE-20
Improper Input Validation