{ "id": "CVE-2007-5247", "sourceIdentifier": "cve@mitre.org", "published": "2007-10-06T17:17:00.000", "lastModified": "2018-10-15T21:41:47.430", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Multiple format string vulnerabilities in the Monolith Lithtech engine, as used by First Encounter Assault Recon (F.E.A.R.) 1.08 and earlier, when Punkbuster (PB) is enabled, allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in (1) a PB_Y packet to the YPG server on UDP port 27888 or (2) a PB_U packet to UCON on UDP port 27888, different vectors than CVE-2004-1500. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de formato de cadena en el motor Monolith Lithtech, utilizado en First Encounter Assault Recon (F.E.A.R.) 1.08 y anteriores, cuando Punkbuster (PB) est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar denegaci\u00f3n de servicio (caida de demonio) a trav\u00e9s de un formato de cadena espec\u00edfico en (1) un paquete PB_Y en el servidor YPG sobre UDP puerto 27888 o (2) un paquete PB_U en UCON sobre UDP puerto 27888, vectores diferentes que CVE-2004-1500. NOTA: este asunto podr\u00eda estar en Punkbuster por si mismo, pero hay pocos detalles para estar seguros." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3 }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-134" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:monolith_productions:first_encounter_assault_recon:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.08", "matchCriteriaId": "5F17E592-FE6A-44DD-B70F-BCAEED1A4C76" } ] } ] } ], "references": [ { "url": "http://aluigi.altervista.org/adv/fearfspb-adv.txt", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://aluigi.org/poc/fearfspb.zip", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://securityreason.com/securityalert/3197", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/481231/100/0/threaded", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36900", "source": "cve@mitre.org" } ] }