The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5069.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161752.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/06/25/12 | Mailing List Patch Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/75425 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1236010 | Issue Tracking Patch Third Party Advisory VDB Entry |
https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59 | Patch Third Party Advisory |
https://github.com/wesnoth/wesnoth/releases/tag/1.12.4 | Release Notes Third Party Advisory |
https://github.com/wesnoth/wesnoth/releases/tag/1.13.1 | Release Notes Third Party Advisory |
https://gna.org/bugs/?23504 | Broken Link |
Configurations
History
No history.
Information
Published : 2017-09-26 14:29
Updated : 2024-02-04 19:29
NVD link : CVE-2015-5070
Mitre link : CVE-2015-5070
CVE.ORG link : CVE-2015-5070
JSON object : View
Products Affected
wesnoth
- battle_for_wesnoth
fedoraproject
- fedora
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor