128 lines
3.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-15007",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-06-24T11:15:12.090",
"lastModified": "2020-07-08T14:33:01.137",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow in the M_LoadDefaults function in m_misc.c in id Tech 1 (aka Doom engine) allows arbitrary code execution via an unsafe usage of fscanf, because it does not limit the number of characters to be read in a format argument."
},
{
"lang": "es",
"value": "Un desbordamiento del b\u00fafer en la funci\u00f3n M_LoadDefaults en el archivo m_misc.c en id Tech versi\u00f3n 1 (tambi\u00e9n se conoce como motor Doom), permite una ejecuci\u00f3n de c\u00f3digo arbitrario por medio de un uso no seguro de fscanf, porque no limita el n\u00famero de caracteres para ser le\u00eddo en un argumento de formato"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:idsoftware:tech_1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10E62151-61CA-4011-8537-F5EB5F9381A1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:doom_vanille_project:doom_vanille:*:*:*:*:*:*:*:*",
"versionEndExcluding": "671",
"matchCriteriaId": "FDA88BB8-8E08-4022-A080-2EBEB0C5EA90"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/AXDOOMER/doom-vanille/commit/8a6d9a02fa991a91ff90ccdc73b5ceabaa6cb9ec",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://twitter.com/notrevenant/status/1268654123903340544",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}