CVE-2011-3012
https://notcve.org/view.php?id=CVE-2011-3012
The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764. El motor ioQuake3, tal como se usa en World of Padman 1.2 y versiones anteriores, Tremulous 1.1.0 y ioUrbanTerror 2007-12-20, no comprueba las extensiones de ficheros maliciosas antes de copiarlos al directorio quake3, lo que permite a atacantes remotos ejecutar código arbitrario a través de complementos de terceras partes modificados que crean un archivo DLL troyanizado. Una vulnerabilidad distinta a la del CVE-2011-2764. • http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html http://securityreason.com/securityalert/8324 http://www.securityfocus.com/archive/1/519051/100/0/threaded http://www.securityfocus.com/bid/48915 https://bugzilla.redhat.com/show_bug.cgi?id=725951 https://exchange.xforce.ibmcloud.com/vulnerabilities/68870 https://exchange.xforce.ibmcloud.com/vulnerabilities/69164 https://security.gentoo.org/glsa/201706-23 • CWE-20: Improper Input Validation •
CVE-2011-1412 – Quake 3 Shell Injection / Code Execution
https://notcve.org/view.php?id=CVE-2011-1412
sys/sys_unix.c in the ioQuake3 engine on Unix and Linux, as used in World of Padman 1.5.x before 1.5.1.1 and OpenArena 0.8.x-15 and 0.8.x-16, allows remote game servers to execute arbitrary commands via shell metacharacters in a long fs_game variable. sys/sys_unix.c del motor ioQuake3 en Unix y Linux, tal como se usa en World of Padman 1.5.x anteriores a 1.5.1.1 y OpenArena 0.8.x-15 y 0.8.x-16, permite a servidores del juego remotos ejecutar comandos arbitrarios a través de meta-caracteres de shell en una variable extensa fs_game. Multiple games using the Quake engine suffer from remote shell injection and code execution vulnerabilities. • http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html http://secunia.com/advisories/45417 http://secunia.com/advisories/45468 http://securityreason.com/securityalert/8324 http://svn.icculus.org/quake3?view=rev&revision=2097 http://thilo.tjps.eu/download/patches/ioq3-svn-r2097.diff http://worldofpadman.com/website/news/en/article/266/wop-1-5-1-1-hotfix-released-for-linux.html http://www • CWE-20: Improper Input Validation •
CVE-2011-2764 – Quake 3 Shell Injection / Code Execution
https://notcve.org/view.php?id=CVE-2011-2764
The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin' Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file. La función FS_CheckFilenameIsNotExecutable de qcommon/files.c en el motor de ioQuake3 1.36 y versiones anteriores, tal como se usa en "World of Padman", "Smokin' Guns", OpenArena, Tremulous y ioUrbanTerror, no detecta extensiones de archivo peligrosas, lo que permite a atacantes remotos ejecutar código arbitrario a través de un complemento de terceras partes modificado que crea un archivo DLL troyanizado. Multiple games using the Quake engine suffer from remote shell injection and code execution vulnerabilities. • http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html http://secunia.com/advisories/45539 http://secunia.com/advisories/45540 http://securityreason.com/securityalert/8324 http://svn.icculus.org/quake3?view=rev&revision=2098 http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff http://www.securityfocus.com/archive/1/519051/100/0/threaded http://www.securityfocus.com/bid/48915 https:/ • CWE-20: Improper Input Validation •