[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98503

 
 

909

 
 

79321

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-5248

Date: (C)2007-10-06   (M)2017-08-01 


Multiple format string vulnerabilities in the ID Software Doom 3 engine, as used by Doom 3 1.3.1 and earlier, Quake 4 1.4.2 and earlier, and Prey 1.3 and earlier, when Punkbuster (PB) is enabled, allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in (1) a PB_Y packet to the YPG server or (2) a PB_U packet to UCON. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain.

CVSS Score: 9.3Access Vector: NETWORK
Exploit Score: 8.6Access Complexity: MEDIUM
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
http://www.securityfocus.com/archive/1/archive/1/481229/100/0/threaded
BID-25893
SECUNIA-27002
SECUNIA-27023
SECUNIA-27036
SREASON-3196
ADV-2007-3333
doom3engine-punkbuster-format-string(36899)
http://aluigi.altervista.org/adv/d3engfspb-adv.txt
http://aluigi.org/poc/d3engfspb.zip

CWE    1
CWE-134

© 2013 SecPod Technologies