First published: Tue Mar 14 2017(Updated: )
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A malicious auto-downloaded file can contain configuration defaults that override the user's. Executable bytecode in a malicious auto-downloaded file can set configuration variables to values that will result in unwanted native code DLLs being loaded, resulting in sandbox escape.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ioquake3 | 1.36+u20201117.d1b7ab6~dfsg-1 1.36+u20221123.70d07d9+dfsg-1 1.36+u20240714.15f5fe7+dfsg-1 | |
debian/iortcw | 1.51.c+dfsg1-3 1.51.c+dfsg1-4 1.51.c+dfsg1-7 | |
ioquake3 | <=2017-02-27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6903 is classified as a high severity vulnerability due to the potential for remote code execution via malicious auto-downloaded files.
To remediate CVE-2017-6903, update ioquake3 or iortcw to their fixed versions as specified by Debian security advisories.
Versions of ioquake3 prior to 2017-02-27 are affected by CVE-2017-6903.
CVE-2017-6903 affects ioquake3, Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 forks.
Exploiting CVE-2017-6903 could allow a malicious actor to load and execute crafted files automatically without user consent.