First published: Thu Mar 12 2009(Updated: )
The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
The Battle for Wesnoth | =1.1.11 | |
The Battle for Wesnoth | =1.0-rc | |
The Battle for Wesnoth | =1.5.6 | |
The Battle for Wesnoth | =1.4.6 | |
The Battle for Wesnoth | =1.1.8 | |
The Battle for Wesnoth | =1.2.4 | |
The Battle for Wesnoth | =1.5.4 | |
The Battle for Wesnoth | =1.5.10 | |
The Battle for Wesnoth | =1.1 | |
The Battle for Wesnoth | =1.2.2 | |
The Battle for Wesnoth | =1.4.5 | |
The Battle for Wesnoth | =1.5.3 | |
The Battle for Wesnoth | =1.4.1 | |
The Battle for Wesnoth | =1.1.3 | |
The Battle for Wesnoth | =1.3.10 | |
The Battle for Wesnoth | =1.2.7 | |
The Battle for Wesnoth | =1.3.17 | |
The Battle for Wesnoth | =1.3.16 | |
The Battle for Wesnoth | =1.5.7 | |
The Battle for Wesnoth | =1.1.14 | |
The Battle for Wesnoth | =1.2.1 | |
The Battle for Wesnoth | =1.1.6 | |
The Battle for Wesnoth | =1.5.8 | |
The Battle for Wesnoth | =1.5.9 | |
The Battle for Wesnoth | =1.2.5 | |
The Battle for Wesnoth | =1.5.0 | |
The Battle for Wesnoth | =1.5.5 | |
The Battle for Wesnoth | =1.4 | |
The Battle for Wesnoth | =1.1.1 | |
The Battle for Wesnoth | =1.2.8 | |
The Battle for Wesnoth | <=1.5.11 | |
The Battle for Wesnoth | =1.3.19 | |
The Battle for Wesnoth | =1.3.9 | |
The Battle for Wesnoth | =1.3.13 | |
The Battle for Wesnoth | =1.3.15 | |
The Battle for Wesnoth | =1.3.18 | |
The Battle for Wesnoth | =1.5.1 | |
The Battle for Wesnoth | =1.3.12 | |
The Battle for Wesnoth | =1.3.11 | |
The Battle for Wesnoth | =1.4.3 | |
The Battle for Wesnoth | =1.4.2 | |
The Battle for Wesnoth | =1.1.10 | |
The Battle for Wesnoth | =1.1.5 | |
The Battle for Wesnoth | =1.2.3 | |
The Battle for Wesnoth | =1.1.4 | |
The Battle for Wesnoth | =1.4.4 | |
The Battle for Wesnoth | =1.2.6 | |
The Battle for Wesnoth | =1.1.9 | |
The Battle for Wesnoth | =1.1.12 | |
The Battle for Wesnoth | =1.3.14 | |
The Battle for Wesnoth | =1.1.7 | |
The Battle for Wesnoth | =1.4.7 | |
The Battle for Wesnoth | =1.1.2 | |
The Battle for Wesnoth | =1.1.13 | |
The Battle for Wesnoth | =1.2 | |
The Battle for Wesnoth | =1.3.8 | |
The Battle for Wesnoth | =1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0366 has a severity level categorized as a denial of service vulnerability.
To fix CVE-2009-0366, you should upgrade to a patched version of Wesnoth that addresses this vulnerability.
CVE-2009-0366 affects multiple versions of Wesnoth including 1.0-rc, 1.1.x, 1.2.x, 1.4.x, and 1.5.x.
CVE-2009-0366 can be exploited by remote attackers sending a large compressed WML document.
Currently, there is no specific workaround for CVE-2009-0366 aside from applying the necessary updates.