Quake 3 client/cl_parse.c 输入验证漏洞

漏洞信息详情

Quake 3 client/cl_parse.c 输入验证漏洞

漏洞简介

id3 Quake 3 Engine 1.32c和Icculus Quake 3 Engine (ioquake3) 810修订版及更早版本中的client/cl_parse.c,可让远程恶意服务器通过从服务器发送的cvar名称和值字符串覆盖客户机上任意写保护的cvar变量,例如关于自动下载的cl_allowdownload和关于quake3路径的fs_homepath。

漏洞公告

参考网址

来源: VUPEN

名称: ADV-2006-2569

链接:http://www.frsirt.com/english/advisories/2006/2569

来源: BID

名称: 18685

链接:http://www.securityfocus.com/bid/18685

来源: BUGTRAQ

名称: 20060628 Re: Files and cvars overwriting in Quake 3 engine (1.32c / rev 803 / …)

链接:http://www.securityfocus.com/archive/1/archive/1/438660/100/0/threaded

来源: BUGTRAQ

名称: 20060627 Files and cvars overwriting in Quake 3 engine (1.32c / rev 803 / …)

链接:http://www.securityfocus.com/archive/1/archive/1/438515/100/0/threaded

来源: SECUNIA

名称: 20851

链接:http://secunia.com/advisories/20851

来源: SECUNIA

名称: 20401

链接:http://secunia.com/advisories/20401

来源: MISC

链接:http://aluigi.altervista.org/adv/q3cfilevar-adv.txt

来源: XF

名称: quake3-cvar-file-overwrite(27486)

链接:http://xforce.iss.net/xforce/xfdb/27486

来源: XF

名称: quake3-clparsedownload-bo(26889)

链接:http://xforce.iss.net/xforce/xfdb/26889

来源: SREASON

名称: 1171

链接:http://securityreason.com/securityalert/1171

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享