Executive Summary
Summary | |
---|---|
Title | New wesnoth packages fix arbitrary file disclosure |
Informations | |||
---|---|---|---|
Name | DSA-1421 | First vendor Publication | 2007-12-06 |
Vendor | Debian | Last vendor Modification | 2007-12-06 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 8.5 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability has been discovered in Battle for Wesnoth that allows remote attackers to read arbitrary files the user running the client has access to on the machine running the game client. For the old stable distribution (sarge) this problem has been fixed in version 0.9.0-7. For the stable distribution (etch) this problem has been fixed in version 1.2-3. For the stable backports distribution (etch-backports) this problem has been fixed in version 1.2.8-1~bpo40+1. For the unstable distribution (sid) this problem has been fixed in version 1.2.8-1. For the experimental distribution this problem has been fixed in version 1.3.12-1. We recommend that you upgrade your wesnoth package. |
Original Source
Url : http://www.debian.org/security/2007/dsa-1421 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18747 | |||
Oval ID: | oval:org.mitre.oval:def:18747 | ||
Title: | DSA-1421-1 wesnoth - directory traversal | ||
Description: | A vulnerability has been discovered in Battle for Wesnoth that allows remote attackers to read arbitrary files the user running the client has access to on the machine running the game client. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1421-1 CVE-2007-5742 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | wesnoth |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-02-27 | Name : Fedora Update for wesnoth FEDORA-2007-3986 File : nvt/gb_fedora_2007_3986_wesnoth_fc7.nasl |
2009-02-27 | Name : Fedora Update for wesnoth FEDORA-2007-3989 File : nvt/gb_fedora_2007_3989_wesnoth_fc8.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1421-1 (wesnoth) File : nvt/deb_1421_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
41713 | Wesnoth WML Engine Preprocessor Unspecified Traversal Arbitrary File Access |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-12-07 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1421.nasl - Type : ACT_GATHER_INFO |
2007-12-04 | Name : The remote Fedora host is missing a security update. File : fedora_2007-3986.nasl - Type : ACT_GATHER_INFO |
2007-12-04 | Name : The remote Fedora host is missing a security update. File : fedora_2007-3989.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:27:04 |
|