Page MenuHomeFreeBSD

D10244.diff
No OneTemporary

D10244.diff

Index: security/vuxml/vuln.xml
===================================================================
--- security/vuxml/vuln.xml
+++ security/vuxml/vuln.xml
@@ -58,6 +58,45 @@
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e48355d7-1548-11e7-8611-0090f5f2f347">
+ <topic>id Tech 3 -- remote code execution vulnerability</topic>
+ <affects>
+ <package>
+ <name>ioquake3</name>
+ <range><lt>1.36_16</lt></range>
+ </package>
+ <package>
+ <name>ioquake3-devel</name>
+ <range><lt>g2930</lt></range>
+ </package>
+ <package>
+ <name>iourbanterror</name>
+ <range><lt>4.3.2,1</lt></range>
+ </package>
+ <package>
+ <name>openarena</name>
+ <range><lt>0.8.8.s1910_3,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The content auto-download of id Tech 3 can be used to deliver
+ maliciously crafted content, that triggers downloading of
+ further content and loading and executing it as native code
+ with user credentials. This affects ioquake3, ioUrbanTerror,
+ OpenArena, the original Quake 3 Arena and other forks.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2017-6903</cvename>
+ <url>https://ioquake3.org/2017/03/13/important-security-update-please-update-ioquake3-immediately/</url>
+ </references>
+ <dates>
+ <discovery>2017-03-14</discovery>
+ <entry>2017-03-30</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7cf058d8-158d-11e7-ba2c-e8e0b747a45a">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>

File Metadata

Mime Type
text/plain
Expires
Fri, Mar 27, 6:40 PM (9 h, 12 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
30391035
Default Alt Text
D10244.diff (1 KB)

Event Timeline