Vulnerability CVE-2011-3012


Published: 2011-08-09   Modified: 2012-02-13

Description:
The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.

See advisories in our WLB2 database:
Topic
Author
Date
High
ioQuake3 Remote shell injection
Thilo Schulz
06.08.2011

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Worldofpadman -> World of padman 
Urbanterror -> Iourbanterror 
Tremulous -> Tremulous 
Ioquake3 -> Ioquake3 engine 

 References:
http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html
http://securityreason.com/securityalert/8324
http://www.securityfocus.com/archive/1/519051/100/0/threaded
http://www.securityfocus.com/bid/48915
https://bugzilla.redhat.com/show_bug.cgi?id=725951
https://exchange.xforce.ibmcloud.com/vulnerabilities/68870
https://exchange.xforce.ibmcloud.com/vulnerabilities/69164
https://security.gentoo.org/glsa/201706-23

Copyright 2020, cxsecurity.com

 

Back to Top