Vulnerability CVE-2007-5248


Published: 2007-10-06   Modified: 2012-02-12

Description:
Multiple format string vulnerabilities in the ID Software Doom 3 engine, as used by Doom 3 1.3.1 and earlier, Quake 4 1.4.2 and earlier, and Prey 1.3 and earlier, when Punkbuster (PB) is enabled, allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in (1) a PB_Y packet to the YPG server or (2) a PB_U packet to UCON. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain.

See advisories in our WLB2 database:
Topic
Author
Date
High
Format string in the Doom 3 engine through PB
Luigi Auriemma
06.10.2007

Type:

CWE-134

(Uncontrolled Format String)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Take2games -> PREY 
Id software -> Doom 3 
Id software -> Quake 4 

 References:
http://aluigi.altervista.org/adv/d3engfspb-adv.txt
http://aluigi.org/poc/d3engfspb.zip
http://securityreason.com/securityalert/3196
http://www.securityfocus.com/archive/1/481229/100/0/threaded
http://www.securityfocus.com/bid/25893
http://www.vupen.com/english/advisories/2007/3333
https://exchange.xforce.ibmcloud.com/vulnerabilities/36899

Copyright 2024, cxsecurity.com

 

Back to Top