cpe:/a:bernhard_wymann:torcs:1.2.3 cpe:/a:bernhard_wymann:torcs:1.2.4 cpe:/a:bernhard_wymann:torcs:1.3.0 cpe:/a:bernhard_wymann:torcs:1.3.1 cpe:/a:bernhard_wymann:torcs:1.3.2 cpe:/a:speed-dreams:speed_dreams:- CVE-2012-1189 2012-10-08T14:55:01.153-04:00 2012-10-09T00:00:00.000-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2012-10-09T14:16:00.000-04:00 EXPLOIT-DB 18471 OSVDB 79372 MLIST [oss-security] 20120218 TORCS 1.3.2 xml buffer overflow - CVE-2012-1189 MLIST [oss-security] 20120305 Re: TORCS 1.3.2 xml buffer overflow - CVE-2012-1189 CONFIRM http://freecode.com/projects/torcs/releases/341672 CONFIRM http://torcs.sourceforge.net/index.php?name=News&file=article&sid=79 Stack-based buffer overflow in modules/graphic/ssgraph/grsound.cpp in The Open Racing Car Simulator (TORCS) before 1.3.3 and Speed Dreams allows user-assisted remote attackers to execute arbitrary code via a long file name in an engine sample attribute in an xml configuration file.