ID CVE-2004-2597
Summary Quake II server before R1Q2, as used in multiple products, allows remote attackers to bypass IP-based access control rules via a userinfo string that already contains an "ip" key/value pair but is also long enough to cause a new key/value pair to be truncated, which interferes with the server's ability to find the client's IP address.
References
Vulnerable Configurations
  • cpe:2.3:a:id_software:quake_ii_server:3.20:*:*:*:*:*:*:*
    cpe:2.3:a:id_software:quake_ii_server:3.20:*:*:*:*:*:*:*
  • cpe:2.3:a:id_software:quake_ii_server:3.21:*:*:*:*:*:*:*
    cpe:2.3:a:id_software:quake_ii_server:3.21:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bid 11551
bugtraq 20041027 Multiple Vulnerabilites in Quake II Server
confirm http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/
misc http://secur1ty.net/advisories/001
osvdb 11186
sectrack 1011979
secunia 13013
xf quake-ip-spoofing(17895)
Last major update 11-07-2017 - 01:32
Published 31-12-2004 - 05:00
Last modified 11-07-2017 - 01:32
Back to Top