Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1230: Quake 2 server allows remote attackers to cause a denial of service via a spoofed UDP packet with a

0
Medium
VulnerabilityCVE-1999-1230cve-1999-1230rcedenial of service
Published: Wed Dec 24 1997 (12/24/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: id_software
Product: quake_2

Description

Quake 2 server allows remote attackers to cause a denial of service via a spoofed UDP packet with a source address of 127.0.0.1, which causes the server to attempt to connect to itself.

AI-Powered Analysis

AILast updated: 07/01/2025, 22:55:45 UTC

Technical Analysis

CVE-1999-1230 is a vulnerability found in the Quake 2 game server developed by id Software. The issue arises from the server's handling of UDP packets, specifically when it receives a spoofed UDP packet with a source IP address of 127.0.0.1 (the localhost address). When such a packet is received, the Quake 2 server attempts to connect to itself, which leads to a denial of service (DoS) condition. This vulnerability does not affect confidentiality or integrity but impacts availability by causing the server to become unresponsive or crash. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). No user interaction is needed. The vulnerability was published in 1997 and has a CVSS v2 base score of 5.0, categorized as medium severity. There is no patch available for this issue, and no known exploits have been reported in the wild. The vulnerability is specific to the Quake 2 server software and its UDP packet processing logic. Since the attack involves spoofing a UDP packet from the localhost IP, it exploits trust assumptions in the server's network handling code.

Potential Impact

For European organizations, the impact of this vulnerability is generally limited to environments where Quake 2 servers are actively used, such as gaming communities, educational institutions, or legacy systems running the game server for research or entertainment. The primary impact is denial of service, which could disrupt gaming sessions or server availability. There is no direct risk to sensitive data confidentiality or integrity. However, if the Quake 2 server is hosted on infrastructure shared with other critical services, the DoS could indirectly affect broader system availability. Given the age of the vulnerability and the niche use of Quake 2 servers in modern contexts, the overall risk to European enterprises is low. Nonetheless, gaming servers operated by hobbyists or niche communities could be targeted to cause disruption or reputational damage.

Mitigation Recommendations

Since no official patch is available, mitigation should focus on network-level controls and server configuration. Practical steps include: 1) Implement ingress and egress filtering on network devices to block spoofed packets, especially those claiming to originate from localhost (127.0.0.1) or other reserved IP ranges. 2) Deploy firewall rules to restrict UDP traffic to and from the Quake 2 server to trusted IP addresses or subnets. 3) Use network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious UDP packets with spoofed source addresses. 4) Consider isolating the Quake 2 server in a segmented network zone to limit potential impact. 5) If possible, migrate to updated or alternative game server software that does not exhibit this vulnerability. 6) Monitor server logs for unusual connection attempts or crashes that may indicate exploitation attempts. These measures reduce the attack surface and help prevent exploitation despite the absence of a patch.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de899

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 10:55:45 PM

Last updated: 2/7/2026, 2:16:45 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats