![](/assets/img/cve_300x82_sin_bg.png)
CVE-2009-0366
https://notcve.org/view.php?id=CVE-2009-0366
12 Mar 2009 — The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document. La función uncompress_buffer en src/server/simple_wml.cpp en Wesnoth anterior a r33069 permite a atacantes remoto provocar una denegación de servicio a través de un documento WML de gran tamaño comprimido. • http://launchpad.net/bugs/335089 • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2009-0878
https://notcve.org/view.php?id=CVE-2009-0878
12 Mar 2009 — The read_game_map function in src/terrain_translation.cpp in Wesnoth before r32987 allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a map with a large (1) width or (2) height. La función read_game_map en src/terrain_translation.cpp en Wesnoth anterior a r32987, permite a los atacantes remotos causar una denegación de servicio (consumo de memoria y cuelgue de demonio) a través un mapa con una gran (1) anchura o (2) peso. • http://launchpad.net/bugs/335089 • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2009-0367 – Wesnoth 1.x - PythonAI Remote Code Execution
https://notcve.org/view.php?id=CVE-2009-0367
05 Mar 2009 — The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module. El módulo Python AI de Wesnoth v1.4.x y v1.5 anterior a v1.5.11, permite a atacantes remotos escapar del sandbox -cajón de arena- y ejecutar código de su elección utilizando un módulo de lista blanca que importa un módul... • https://www.exploit-db.com/exploits/32837 • CWE-264: Permissions, Privileges, and Access Controls •