2017-10-16 12:31:07 -04:00
{
2019-03-18 01:54:54 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2017-6903" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-18 01:54:54 +00:00
"lang" : "eng" ,
"value" : "In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A malicious auto-downloaded file can contain configuration defaults that override the user's. Executable bytecode in a malicious auto-downloaded file can set configuration variables to values that will result in unwanted native code DLLs being loaded, resulting in sandbox escape."
2017-10-16 12:31:07 -04:00
}
2019-03-18 01:54:54 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998"
} ,
{
"name" : "DSA-3812" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2017/dsa-3812"
} ,
{
"name" : "https://github.com/iortcw/iortcw/commit/b248763e4878ef12d5835ece6600be8334f67da1" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/iortcw/iortcw/commit/b248763e4878ef12d5835ece6600be8334f67da1"
} ,
{
"name" : "https://github.com/ioquake/ioq3/commit/b173ac05993f634a42be3d3535e1b158de0c3372" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/ioquake/ioq3/commit/b173ac05993f634a42be3d3535e1b158de0c3372"
} ,
{
"name" : "https://github.com/JACoders/OpenJK/commit/8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/JACoders/OpenJK/commit/8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7"
} ,
{
"name" : "https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d"
} ,
{
"name" : "https://ioquake3.org/2017/03/13/important-security-update-please-update-ioquake3-immediately/" ,
"refsource" : "CONFIRM" ,
"url" : "https://ioquake3.org/2017/03/13/important-security-update-please-update-ioquake3-immediately/"
} ,
{
"name" : "https://github.com/ioquake/ioq3/commit/376267d534476a875d8b9228149c4ee18b74a4fd" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/ioquake/ioq3/commit/376267d534476a875d8b9228149c4ee18b74a4fd"
} ,
{
"name" : "https://github.com/iortcw/iortcw/commit/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/iortcw/iortcw/commit/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20"
} ,
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857699" ,
"refsource" : "CONFIRM" ,
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857699"
}
]
}
}