Skip to main content

CVE-1999-1230: Quake 2 server allows remote attackers to cause a denial of service via a spoofed UDP packet with a

Medium
VulnerabilityCVE-1999-1230cve-1999-1230rcedenial of service
Published: Wed Dec 24 1997 (12/24/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: id_software
Product: quake_2

Description

Quake 2 server allows remote attackers to cause a denial of service via a spoofed UDP packet with a source address of 127.0.0.1, which causes the server to attempt to connect to itself.

AI-Powered Analysis

AILast updated: 07/01/2025, 22:55:45 UTC

Technical Analysis

CVE-1999-1230 is a vulnerability found in the Quake 2 game server developed by id Software. The issue arises from the server's handling of UDP packets, specifically when it receives a spoofed UDP packet with a source IP address of 127.0.0.1 (the localhost address). When such a packet is received, the Quake 2 server attempts to connect to itself, which leads to a denial of service (DoS) condition. This vulnerability does not affect confidentiality or integrity but impacts availability by causing the server to become unresponsive or crash. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). No user interaction is needed. The vulnerability was published in 1997 and has a CVSS v2 base score of 5.0, categorized as medium severity. There is no patch available for this issue, and no known exploits have been reported in the wild. The vulnerability is specific to the Quake 2 server software and its UDP packet processing logic. Since the attack involves spoofing a UDP packet from the localhost IP, it exploits trust assumptions in the server's network handling code.

Potential Impact

For European organizations, the impact of this vulnerability is generally limited to environments where Quake 2 servers are actively used, such as gaming communities, educational institutions, or legacy systems running the game server for research or entertainment. The primary impact is denial of service, which could disrupt gaming sessions or server availability. There is no direct risk to sensitive data confidentiality or integrity. However, if the Quake 2 server is hosted on infrastructure shared with other critical services, the DoS could indirectly affect broader system availability. Given the age of the vulnerability and the niche use of Quake 2 servers in modern contexts, the overall risk to European enterprises is low. Nonetheless, gaming servers operated by hobbyists or niche communities could be targeted to cause disruption or reputational damage.

Mitigation Recommendations

Since no official patch is available, mitigation should focus on network-level controls and server configuration. Practical steps include: 1) Implement ingress and egress filtering on network devices to block spoofed packets, especially those claiming to originate from localhost (127.0.0.1) or other reserved IP ranges. 2) Deploy firewall rules to restrict UDP traffic to and from the Quake 2 server to trusted IP addresses or subnets. 3) Use network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious UDP packets with spoofed source addresses. 4) Consider isolating the Quake 2 server in a segmented network zone to limit potential impact. 5) If possible, migrate to updated or alternative game server software that does not exhibit this vulnerability. 6) Monitor server logs for unusual connection attempts or crashes that may indicate exploitation attempts. These measures reduce the attack surface and help prevent exploitation despite the absence of a patch.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de899

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 10:55:45 PM

Last updated: 7/27/2025, 12:34:14 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats