The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.

Subscriptions

Vendors Products
Ioquake3 Subscribe
Ioquake3 Engine Subscribe
Tremulous Subscribe
Tremulous Subscribe
Urbanterror Subscribe
Iourbanterror Subscribe
Worldofpadman Subscribe
World Of Padman Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2011-2980 The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T23:22:26.678Z

Reserved: 2011-08-09T00:00:00.000Z

Link: CVE-2011-3012

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2011-08-09T20:55:00.747

Modified: 2025-04-11T00:51:21.963

Link: CVE-2011-3012

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses