mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
107 lines
4.6 KiB
JSON
107 lines
4.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2017-6903",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A malicious auto-downloaded file can contain configuration defaults that override the user's. Executable bytecode in a malicious auto-downloaded file can set configuration variables to values that will result in unwanted native code DLLs being loaded, resulting in sandbox escape."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998"
|
|
},
|
|
{
|
|
"name": "DSA-3812",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2017/dsa-3812"
|
|
},
|
|
{
|
|
"name": "https://github.com/iortcw/iortcw/commit/b248763e4878ef12d5835ece6600be8334f67da1",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/iortcw/iortcw/commit/b248763e4878ef12d5835ece6600be8334f67da1"
|
|
},
|
|
{
|
|
"name": "https://github.com/ioquake/ioq3/commit/b173ac05993f634a42be3d3535e1b158de0c3372",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/ioquake/ioq3/commit/b173ac05993f634a42be3d3535e1b158de0c3372"
|
|
},
|
|
{
|
|
"name": "https://github.com/JACoders/OpenJK/commit/8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/JACoders/OpenJK/commit/8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7"
|
|
},
|
|
{
|
|
"name": "https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d"
|
|
},
|
|
{
|
|
"name": "https://ioquake3.org/2017/03/13/important-security-update-please-update-ioquake3-immediately/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://ioquake3.org/2017/03/13/important-security-update-please-update-ioquake3-immediately/"
|
|
},
|
|
{
|
|
"name": "https://github.com/ioquake/ioq3/commit/376267d534476a875d8b9228149c4ee18b74a4fd",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/ioquake/ioq3/commit/376267d534476a875d8b9228149c4ee18b74a4fd"
|
|
},
|
|
{
|
|
"name": "https://github.com/iortcw/iortcw/commit/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/iortcw/iortcw/commit/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20"
|
|
},
|
|
{
|
|
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857699",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857699"
|
|
}
|
|
]
|
|
}
|
|
} |