cpe:/a:wesnoth:battle_for_wesnoth:1.12.2 cpe:/a:wesnoth:battle_for_wesnoth:1.13.0 cpe:/o:fedoraproject:fedora:21 cpe:/o:fedoraproject:fedora:22 CVE-2015-5070 2017-09-26T10:29:00.330-04:00 2017-10-10T10:54:16.533-04:00 3.5 NETWORK MEDIUM SINGLE_INSTANCE PARTIAL NONE NONE http://nvd.nist.gov 2017-10-06T16:29:37.327-04:00 BID 75425 FEDORA FEDORA-2015-10964 FEDORA FEDORA-2015-10973 MLIST [oss-security] 20150625 Re: CVE request: Wesnoth authentication information disclosure CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1236010 CONFIRM https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59 CONFIRM https://github.com/wesnoth/wesnoth/releases/tag/1.12.4 CONFIRM https://github.com/wesnoth/wesnoth/releases/tag/1.13.1 MISC https://gna.org/bugs/?23504 The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5069.