Computer Security
[EN] securityvulns.ru no-pyccku


Quake 3 engine buffer overflow
updated since 06.05.2006
Published:09.05.2006
Source:
SecurityVulns ID:6102
Type:client
Threat Level:
6/10
Description:Buffer overflow on remapShader command processing.
Affected:ID : Quake3Arena 1.32
 GRAYMATTER : Return to Castle Wolfenstein 1.41
 GRAYMATTER : Wolfenstein: Enemy Territory 2.60
Original documentdocumentThilo Schulz, [Full-disclosure] Two independent vulnerabilities (client and server side) in Quake3 engine and many derived games (09.05.2006)
 documentSECUNIA, [SA19984] Quake 3 Engine "remapShader" Command Buffer Overflow (06.05.2006)
Files:"R_RemapShader()" q3 engine 1.32b client remote bof exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod