The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html | mailing list exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68870 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=725951 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/69164 | vdb entry |
http://www.securityfocus.com/bid/48915 | vdb entry |
http://www.securityfocus.com/archive/1/519051/100/0/threaded | mailing list |
http://securityreason.com/securityalert/8324 | third party advisory |
https://security.gentoo.org/glsa/201706-23 | vendor advisory |