Search criteria
3 vulnerabilities by tremulous
CVE-2010-5077 (GCVE-0-2010-5077)
Vulnerability from cvelistv5 – Published: 2014-10-27 20:00 – Updated: 2024-08-07 04:09
VLAI?
Summary
server/sv_main.c in Quake3 Arena, as used in ioquake3 before r1762, OpenArena, Tremulous, and other products, allows remote attackers to cause a denial of service (network traffic amplification) via a spoofed (1) getstatus or (2) rcon request.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:09:38.638Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20120326 Traffic amplification via Quake 3-based servers",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/522076"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://openarena.ws/board/index.php?topic=4391.0"
},
{
"name": "DSA-2442",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2442"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.urbanterror.info/forums/topic/27825-drdos/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665656"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://permalink.gmane.org/gmane.comp.games.ioquake3/961"
},
{
"name": "[oss-security] 20120326 Re: CVE-2010 Request: quake3 / openarena-server: DDoS by processing \u0027getstatus\u0027 and \u0027rcon\u0027 packets",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/03/26/5"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.ioquake.org/forums/viewtopic.php?f=12\u0026t=1694"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-01-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "server/sv_main.c in Quake3 Arena, as used in ioquake3 before r1762, OpenArena, Tremulous, and other products, allows remote attackers to cause a denial of service (network traffic amplification) via a spoofed (1) getstatus or (2) rcon request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-10-27T19:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "20120326 Traffic amplification via Quake 3-based servers",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/522076"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://openarena.ws/board/index.php?topic=4391.0"
},
{
"name": "DSA-2442",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2442"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.urbanterror.info/forums/topic/27825-drdos/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665656"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://permalink.gmane.org/gmane.comp.games.ioquake3/961"
},
{
"name": "[oss-security] 20120326 Re: CVE-2010 Request: quake3 / openarena-server: DDoS by processing \u0027getstatus\u0027 and \u0027rcon\u0027 packets",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/03/26/5"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.ioquake.org/forums/viewtopic.php?f=12\u0026t=1694"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-5077",
"datePublished": "2014-10-27T20:00:00.000Z",
"dateReserved": "2011-12-19T00:00:00.000Z",
"dateUpdated": "2024-08-07T04:09:38.638Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3012 (GCVE-0-2011-3012)
Vulnerability from cvelistv5 – Published: 2011-08-09 20:00 – Updated: 2024-08-06 23:22
VLAI?
Summary
The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:22:26.678Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
},
{
"name": "ioquake-gamecode-code-execution(68870)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
},
{
"name": "ioquake-file-extensions-code-execution(69164)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69164"
},
{
"name": "48915",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48915"
},
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
},
{
"name": "8324",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/8324"
},
{
"name": "GLSA-201706-23",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201706-23"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-28T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
},
{
"name": "ioquake-gamecode-code-execution(68870)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
},
{
"name": "ioquake-file-extensions-code-execution(69164)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69164"
},
{
"name": "48915",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48915"
},
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
},
{
"name": "8324",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/8324"
},
{
"name": "GLSA-201706-23",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201706-23"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3012",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
},
{
"name": "ioquake-gamecode-code-execution(68870)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=725951",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
},
{
"name": "ioquake-file-extensions-code-execution(69164)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69164"
},
{
"name": "48915",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48915"
},
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
},
{
"name": "8324",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8324"
},
{
"name": "GLSA-201706-23",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-23"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-3012",
"datePublished": "2011-08-09T20:00:00.000Z",
"dateReserved": "2011-08-09T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:22:26.678Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-2764 (GCVE-0-2011-2764)
Vulnerability from cvelistv5 – Published: 2011-08-04 01:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin' Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:15:30.694Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098"
},
{
"name": "45540",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45540"
},
{
"name": "ioquake-gamecode-code-execution(68870)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
},
{
"name": "45539",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45539"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff"
},
{
"name": "48915",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48915"
},
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
},
{
"name": "8324",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/8324"
},
{
"name": "GLSA-201706-23",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201706-23"
},
{
"name": "FEDORA-2011-9898",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-28T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098"
},
{
"name": "45540",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45540"
},
{
"name": "ioquake-gamecode-code-execution(68870)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
},
{
"name": "45539",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45539"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff"
},
{
"name": "48915",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48915"
},
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
},
{
"name": "8324",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/8324"
},
{
"name": "GLSA-201706-23",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201706-23"
},
{
"name": "FEDORA-2011-9898",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2764",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
},
{
"name": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098",
"refsource": "CONFIRM",
"url": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098"
},
{
"name": "45540",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45540"
},
{
"name": "ioquake-gamecode-code-execution(68870)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
},
{
"name": "45539",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45539"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=725951",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
},
{
"name": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff",
"refsource": "CONFIRM",
"url": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff"
},
{
"name": "48915",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48915"
},
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
},
{
"name": "8324",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8324"
},
{
"name": "GLSA-201706-23",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-23"
},
{
"name": "FEDORA-2011-9898",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-2764",
"datePublished": "2011-08-04T01:00:00.000Z",
"dateReserved": "2011-07-19T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:15:30.694Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}