cpe:/a:id_software:doom_3:1.3.1 cpe:/a:id_software:quake_4:1.4.2 cpe:/a:take2games:prey:1.3 CVE-2007-5248 2007-10-06T13:17:00.000-04:00 2017-07-28T21:33:30.693-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2007-10-08T16:44:00.000-04:00 ALLOWS_ADMIN_ACCESS BUGTRAQ 20071001 Format string in the Doom 3 engine through PB BID 25893 SECUNIA 27002 SECUNIA 27023 SECUNIA 27036 SREASON 3196 VUPEN ADV-2007-3333 XF doom3engine-punkbuster-format-string(36899) MISC http://aluigi.altervista.org/adv/d3engfspb-adv.txt MISC http://aluigi.org/poc/d3engfspb.zip Multiple format string vulnerabilities in the ID Software Doom 3 engine, as used by Doom 3 1.3.1 and earlier, Quake 4 1.4.2 and earlier, and Prey 1.3 and earlier, when Punkbuster (PB) is enabled, allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in (1) a PB_Y packet to the YPG server or (2) a PB_U packet to UCON. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain.