2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-0983" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-05-02T04:00:00.000" ,
2025-04-03 02:06:18 +00:00
"lastModified" : "2025-04-03T01:03:51.193" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Quake 3 engine, as used in multiple games, allows remote attackers to cause a denial of service (client disconnect) via a long message, which is not properly truncated and causes the engine to process the remaining data as if it were network data."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
2024-11-21 23:11:37 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-21 23:11:37 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:activision:call_of_duty:1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "56174554-305C-44B2-84AC-1FBFB2630806"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:activision:call_of_duty:1.5b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E73821EF-6B2C-47DF-8937-FC4AD438793C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:activision:call_of_duty_united_offensive:1.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "794E93AF-7815-4C7B-B1F5-B24C6C8BFA90"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:activision:call_of_duty_united_offensive:1.51b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A5125394-3D87-449F-8116-1F2F13D0F4CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:activision:return_to_castle_wolfenstein:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3AB8B91F-5F9F-4A10-BD6E-8A6320113163"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:activision:return_to_castle_wolfenstein:1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "310CA9A4-4C58-47F0-B8B7-8602B2E4B290"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:id_software:quake_3_arena:1.1.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AA52F4D3-901C-441C-BFA2-1AF1BD06B967"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:id_software:quake_3_arena:1.16:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FADA6FA7-6916-4240-90B7-5FB045F61F9A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:id_software:quake_3_arena:1.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "12138C9F-1DE9-48D9-AA12-5A621558F825"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:id_software:quake_3_arena_server:1.29f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47BF98EF-3228-4FF5-B770-C1A8BEC3C0A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:id_software:quake_3_arena_server:1.29g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2AEA3ACD-EC79-4AEC-B056-03F72056DE27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:id_software:quake_3_engine:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "68AE0171-46F1-4137-99BE-4B825A403D6E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:id_software:wolfenstein_enemy_territory:1.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FC2CB0EE-8042-4157-BB4B-A4A07BA79FE8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:id_software:wolfenstein_enemy_territory:2.56:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CDC1195-FE8C-4251-91BE-B1B84A785C7D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:lucasarts:star_wars_jedi_knight_ii_jedi_outcast:1.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "736B09BA-E0C4-4179-84B2-F4F8F2FC4B66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:lucasarts:star_wars_jedi_knight_jedi_academy:1.0.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E760893E-36FA-486D-872C-7C8E4B4C0A34"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:raven_software:soldier_of_fortune_2:1.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3EDA57E8-B70F-40F6-83F4-A19A41A55952"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:raven_software:soldier_of_fortune_2:1.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB13EB2B-42EC-45ED-948B-7B2617C1B82C"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://aluigi.altervista.org/adv/q3msgboom-adv.txt" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://bani.anime.net/banimod/forums/viewtopic.php?p=27322" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=111246796918067&w=2" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/14811" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/bid/12976" ,
"source" : "cve@mitre.org"
2024-11-21 23:11:37 +00:00
} ,
{
"url" : "http://aluigi.altervista.org/adv/q3msgboom-adv.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://bani.anime.net/banimod/forums/viewtopic.php?p=27322" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=111246796918067&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/14811" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/12976" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}