CVE-2011-1412

Current Description

sys/sys_unix.c in the ioQuake3 engine on Unix and Linux, as used in World of Padman 1.5.x before 1.5.1.1 and OpenArena 0.8.x-15 and 0.8.x-16, allows remote game servers to execute arbitrary commands via shell metacharacters in a long fs_game variable.

Basic Data

PublishedAugust 04, 2011
Last ModifiedOctober 09, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-20
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • AND
    • OR - Configuration 1
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3ApplicationIoquake3Ioquake3 Engine********
      2.3ApplicationOpenarenaOpenarena0.8.x-15*******
      2.3ApplicationOpenarenaOpenarena0.8.x-16*******
      2.3ApplicationWorldofpadmanWorld Of Padman1.5*******
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSLinuxLinux Kernel********

Vulnerable Software List

VendorProductVersions
Ioquake3 Ioquake3 Engine *
Openarena Openarena 0.8.x-15, 0.8.x-16
Worldofpadman World Of Padman 1.5

References

NameSourceURLTags
20110728 Two security issues fixed in ioQuake3 enginehttp://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.htmlFULLDISCExploit
FEDORA-2011-9898http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.htmlFEDORA
45417http://secunia.com/advisories/45417SECUNIAVendor Advisory
45468http://secunia.com/advisories/45468SECUNIAVendor Advisory
8324http://securityreason.com/securityalert/8324SREASON
http://svn.icculus.org/quake3?view=rev&revision=2097http://svn.icculus.org/quake3?view=rev&revision=2097CONFIRMPatch
http://thilo.tjps.eu/download/patches/ioq3-svn-r2097.diffhttp://thilo.tjps.eu/download/patches/ioq3-svn-r2097.diffCONFIRMPatch
http://worldofpadman.com/website/news/en/article/266/wop-1-5-1-1-hotfix-released-for-linux.htmlhttp://worldofpadman.com/website/news/en/article/266/wop-1-5-1-1-hotfix-released-for-linux.htmlCONFIRMPatch
74137http://www.osvdb.org/74137OSVDB
20110728 Two security issues fixed in ioQuake3 enginehttp://www.securityfocus.com/archive/1/519051/100/0/threadedBUGTRAQ
48915http://www.securityfocus.com/bid/48915BID
https://bugzilla.redhat.com/show_bug.cgi?id=725951https://bugzilla.redhat.com/show_bug.cgi?id=725951CONFIRMExploit Patch
ioquake-idtech-command-execution(68869)https://exchange.xforce.ibmcloud.com/vulnerabilities/68869XF
GLSA-201706-23https://security.gentoo.org/glsa/201706-23GENTOO