Home

Description

Kaillera Server version 0.86 is vulnerable to a denial-of-service condition triggered by sending a malformed UDP packet after the initial handshake. Once a client sends a valid HELLO0.83 packet and receives a response, any subsequent malformed packet causes the server to crash and become unresponsive. This flaw stems from improper input validation in the server’s UDP packet handler, allowing unauthenticated remote attackers to disrupt service availability.

PUBLISHED Reserved 2025-08-18 | Published 2025-08-20 | Updated 2025-08-22 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

*
affected

Credits

Sil3nt_Dre4m finder

References

raw.githubusercontent.com/...y/dos/windows/games/kaillera.rb exploit

www.exploit-db.com/exploits/17460 exploit

kaillera.com/ product

www.vulncheck.com/...era-server-dos-via-malformed-udp-packet third-party-advisory

cve.org (CVE-2011-10020)

nvd.nist.gov (CVE-2011-10020)

Download JSON