First published: Wed Jul 27 2011(Updated: )
sys/sys_unix.c in the ioQuake3 engine on Unix and Linux, as used in World of Padman 1.5.x before 1.5.1.1 and OpenArena 0.8.x-15 and 0.8.x-16, allows remote game servers to execute arbitrary commands via shell metacharacters in a long fs_game variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ioQuake3 | ||
npm | =0.8.x-15 | |
npm | =0.8.x-16 | |
World of Padman | =1.5 | |
Linux Kernel |
http://worldofpadman.com/website/news/en/article/266/wop-1-5-1-1-hotfix-released-for-linux.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1412 has a high severity rating due to its potential to allow remote command execution.
To fix CVE-2011-1412, update to the patched versions of ioQuake3 engine or World of Padman after version 1.5.1.1 or OpenArena version 0.8.x-16.
CVE-2011-1412 affects ioQuake3 engine in versions before 1.5.1.1, OpenArena versions 0.8.x-15, and 0.8.x-16, and World of Padman version 1.5.
The exploit method for CVE-2011-1412 involves using shell metacharacters in a lengthy fs_game variable to execute arbitrary commands.
The Linux kernel itself is not vulnerable to CVE-2011-1412, but the applications running on it may be affected.