2 results (0.005 seconds)

CVSS: 10.0EPSS: 7%CPEs: 4EXPL: 1

The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764. El motor ioQuake3, tal como se usa en World of Padman 1.2 y versiones anteriores, Tremulous 1.1.0 y ioUrbanTerror 2007-12-20, no comprueba las extensiones de ficheros maliciosas antes de copiarlos al directorio quake3, lo que permite a atacantes remotos ejecutar código arbitrario a través de complementos de terceras partes modificados que crean un archivo DLL troyanizado. Una vulnerabilidad distinta a la del CVE-2011-2764. • http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html http://securityreason.com/securityalert/8324 http://www.securityfocus.com/archive/1/519051/100/0/threaded http://www.securityfocus.com/bid/48915 https://bugzilla.redhat.com/show_bug.cgi?id=725951 https://exchange.xforce.ibmcloud.com/vulnerabilities/68870 https://exchange.xforce.ibmcloud.com/vulnerabilities/69164 https://security.gentoo.org/glsa/201706-23 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 10%CPEs: 7EXPL: 2

The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin' Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file. La función FS_CheckFilenameIsNotExecutable de qcommon/files.c en el motor de ioQuake3 1.36 y versiones anteriores, tal como se usa en "World of Padman", "Smokin' Guns", OpenArena, Tremulous y ioUrbanTerror, no detecta extensiones de archivo peligrosas, lo que permite a atacantes remotos ejecutar código arbitrario a través de un complemento de terceras partes modificado que crea un archivo DLL troyanizado. Multiple games using the Quake engine suffer from remote shell injection and code execution vulnerabilities. • http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html http://secunia.com/advisories/45539 http://secunia.com/advisories/45540 http://securityreason.com/securityalert/8324 http://svn.icculus.org/quake3?view=rev&revision=2098 http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff http://www.securityfocus.com/archive/1/519051/100/0/threaded http://www.securityfocus.com/bid/48915 https:/&# • CWE-20: Improper Input Validation •