Buffer overflow in the Quake 3 Engine, as used by (1) ET 2.60, (2) Return to Castle Wolfenstein 1.41, and (3) Quake III Arena 1.32b allows remote attackers to execute arbitrary commands via a long remapShader command.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19984 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/20065 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200605-12.xml - | |
References | () http://www.osvdb.org/25279 - | |
References | () http://www.securityfocus.com/archive/1/433349/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17857 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/1676 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26264 - | |
References | () https://www.exploit-db.com/exploits/1750 - |
Information
Published : 2006-05-08 23:02
Updated : 2024-11-21 00:10
NVD link : CVE-2006-2236
Mitre link : CVE-2006-2236
CVE.ORG link : CVE-2006-2236
JSON object : View
Products Affected
id_software
- wolfenstein_enemy_territory
- quake_3_arena
- quake_3_engine
- return_to_castle_wolfenstein
CWE