CVE-2011-2764 (GCVE-0-2011-2764)

Vulnerability from cvelistv5 – Published: 2011-08-04 01:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin' Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://archives.neohapsis.com/archives/fulldisclo… mailing-listx_refsource_FULLDISC
http://svn.icculus.org/quake3?view=rev&revision=2098 x_refsource_CONFIRM
http://secunia.com/advisories/45540 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/45539 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=725951 x_refsource_CONFIRM
http://thilo.tjps.eu/download/patches/ioq3-svn-r2… x_refsource_CONFIRM
http://www.securityfocus.com/bid/48915 vdb-entryx_refsource_BID
http://www.securityfocus.com/archive/1/519051/100… mailing-listx_refsource_BUGTRAQ
http://securityreason.com/securityalert/8324 third-party-advisoryx_refsource_SREASON
https://security.gentoo.org/glsa/201706-23 vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:30.694Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20110728 Two security issues fixed in ioQuake3 engine",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098"
          },
          {
            "name": "45540",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45540"
          },
          {
            "name": "ioquake-gamecode-code-execution(68870)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
          },
          {
            "name": "45539",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45539"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff"
          },
          {
            "name": "48915",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48915"
          },
          {
            "name": "20110728 Two security issues fixed in ioQuake3 engine",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
          },
          {
            "name": "8324",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8324"
          },
          {
            "name": "GLSA-201706-23",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201706-23"
          },
          {
            "name": "FEDORA-2011-9898",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-07-28T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20110728 Two security issues fixed in ioQuake3 engine",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098"
        },
        {
          "name": "45540",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45540"
        },
        {
          "name": "ioquake-gamecode-code-execution(68870)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
        },
        {
          "name": "45539",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45539"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff"
        },
        {
          "name": "48915",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48915"
        },
        {
          "name": "20110728 Two security issues fixed in ioQuake3 engine",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
        },
        {
          "name": "8324",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8324"
        },
        {
          "name": "GLSA-201706-23",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201706-23"
        },
        {
          "name": "FEDORA-2011-9898",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-2764",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20110728 Two security issues fixed in ioQuake3 engine",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
            },
            {
              "name": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098",
              "refsource": "CONFIRM",
              "url": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098"
            },
            {
              "name": "45540",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/45540"
            },
            {
              "name": "ioquake-gamecode-code-execution(68870)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
            },
            {
              "name": "45539",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/45539"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=725951",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
            },
            {
              "name": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff",
              "refsource": "CONFIRM",
              "url": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff"
            },
            {
              "name": "48915",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48915"
            },
            {
              "name": "20110728 Two security issues fixed in ioQuake3 engine",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
            },
            {
              "name": "8324",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8324"
            },
            {
              "name": "GLSA-201706-23",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201706-23"
            },
            {
              "name": "FEDORA-2011-9898",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-2764",
    "datePublished": "2011-08-04T01:00:00.000Z",
    "dateReserved": "2011-07-19T00:00:00.000Z",
    "dateUpdated": "2024-08-06T23:15:30.694Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ioquake3:ioquake3_engine:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.36\", \"matchCriteriaId\": \"0A70EB58-3D3F-4A80-AD7C-0592C3BD3D3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ioquake3:ioquake3_engine:1.36:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"631580B6-FB90-44D0-A960-DE418F684FF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openarena:openarena:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C66CEED6-0C18-4A8C-8369-2C8E23434587\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:smokin-guns:smokin\\\\\u0027_guns:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00EBAD21-CC29-4EF3-BE6D-334734D175FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tremulous:tremulous:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63624600-4577-4D6E-A733-1668CFD7732C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:urbanterror:iourbanterror:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9CA0A90-BF68-4294-86E5-4CF170709C08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:worldofpadman:world_of_padman:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7D65EC1-0FB2-4628-B877-EE1B00A26B56\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n FS_CheckFilenameIsNotExecutable de qcommon/files.c en el motor de ioQuake3 1.36 y versiones anteriores, tal como se usa en \\\"World of Padman\\\", \\\"Smokin\u0027 Guns\\\", OpenArena, Tremulous y ioUrbanTerror, no detecta extensiones de archivo peligrosas, lo que permite a atacantes remotos ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de un complemento de terceras partes modificado que crea un archivo DLL troyanizado.\"}]",
      "id": "CVE-2011-2764",
      "lastModified": "2024-11-21T01:28:55.480",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2011-08-04T02:45:32.343",
      "references": "[{\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/45539\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/45540\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securityreason.com/securityalert/8324\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://svn.icculus.org/quake3?view=rev\u0026revision=2098\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/519051/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/48915\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=725951\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/68870\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://security.gentoo.org/glsa/201706-23\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/45539\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/45540\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/8324\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://svn.icculus.org/quake3?view=rev\u0026revision=2098\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/519051/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/48915\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=725951\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/68870\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201706-23\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-2764\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-08-04T02:45:32.343\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n FS_CheckFilenameIsNotExecutable de qcommon/files.c en el motor de ioQuake3 1.36 y versiones anteriores, tal como se usa en \\\"World of Padman\\\", \\\"Smokin\u0027 Guns\\\", OpenArena, Tremulous y ioUrbanTerror, no detecta extensiones de archivo peligrosas, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un complemento de terceras partes modificado que crea un archivo DLL troyanizado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ioquake3:ioquake3_engine:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.36\",\"matchCriteriaId\":\"0A70EB58-3D3F-4A80-AD7C-0592C3BD3D3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ioquake3:ioquake3_engine:1.36:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"631580B6-FB90-44D0-A960-DE418F684FF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openarena:openarena:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C66CEED6-0C18-4A8C-8369-2C8E23434587\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smokin-guns:smokin\\\\\u0027_guns:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EBAD21-CC29-4EF3-BE6D-334734D175FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tremulous:tremulous:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63624600-4577-4D6E-A733-1668CFD7732C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:urbanterror:iourbanterror:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9CA0A90-BF68-4294-86E5-4CF170709C08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:worldofpadman:world_of_padman:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7D65EC1-0FB2-4628-B877-EE1B00A26B56\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/45539\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/45540\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/8324\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://svn.icculus.org/quake3?view=rev\u0026revision=2098\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/519051/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/48915\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=725951\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/68870\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201706-23\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/45539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/45540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/8324\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.icculus.org/quake3?view=rev\u0026revision=2098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/519051/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/48915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=725951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/68870\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201706-23\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…