mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
203 lines
6.9 KiB
JSON
203 lines
6.9 KiB
JSON
{
|
|
"id": "CVE-2005-0983",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-05-02T04:00:00.000",
|
|
"lastModified": "2025-04-03T01:03:51.193",
|
|
"vulnStatus": "Deferred",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Quake 3 engine, as used in multiple games, allows remote attackers to cause a denial of service (client disconnect) via a long message, which is not properly truncated and causes the engine to process the remaining data as if it were network data."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:activision:call_of_duty:1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56174554-305C-44B2-84AC-1FBFB2630806"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:activision:call_of_duty:1.5b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E73821EF-6B2C-47DF-8937-FC4AD438793C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:activision:call_of_duty_united_offensive:1.41:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "794E93AF-7815-4C7B-B1F5-B24C6C8BFA90"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:activision:call_of_duty_united_offensive:1.51b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A5125394-3D87-449F-8116-1F2F13D0F4CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:activision:return_to_castle_wolfenstein:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3AB8B91F-5F9F-4A10-BD6E-8A6320113163"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:activision:return_to_castle_wolfenstein:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "310CA9A4-4C58-47F0-B8B7-8602B2E4B290"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:id_software:quake_3_arena:1.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA52F4D3-901C-441C-BFA2-1AF1BD06B967"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:id_software:quake_3_arena:1.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FADA6FA7-6916-4240-90B7-5FB045F61F9A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:id_software:quake_3_arena:1.31:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12138C9F-1DE9-48D9-AA12-5A621558F825"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:id_software:quake_3_arena_server:1.29f:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47BF98EF-3228-4FF5-B770-C1A8BEC3C0A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:id_software:quake_3_arena_server:1.29g:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2AEA3ACD-EC79-4AEC-B056-03F72056DE27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:id_software:quake_3_engine:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68AE0171-46F1-4137-99BE-4B825A403D6E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:id_software:wolfenstein_enemy_territory:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC2CB0EE-8042-4157-BB4B-A4A07BA79FE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:id_software:wolfenstein_enemy_territory:2.56:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1CDC1195-FE8C-4251-91BE-B1B84A785C7D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lucasarts:star_wars_jedi_knight_ii_jedi_outcast:1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "736B09BA-E0C4-4179-84B2-F4F8F2FC4B66"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lucasarts:star_wars_jedi_knight_jedi_academy:1.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E760893E-36FA-486D-872C-7C8E4B4C0A34"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:raven_software:soldier_of_fortune_2:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3EDA57E8-B70F-40F6-83F4-A19A41A55952"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:raven_software:soldier_of_fortune_2:1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB13EB2B-42EC-45ED-948B-7B2617C1B82C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://aluigi.altervista.org/adv/q3msgboom-adv.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://bani.anime.net/banimod/forums/viewtopic.php?p=27322",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=111246796918067&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/14811",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/12976",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://aluigi.altervista.org/adv/q3msgboom-adv.txt",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://bani.anime.net/banimod/forums/viewtopic.php?p=27322",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=111246796918067&w=2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/14811",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/12976",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |