Quake II server before R1Q2, as used in multiple products, allows remote attackers to bypass IP-based access control rules via a userinfo string that already contains an βipβ key/value pair but is also long enough to cause a new key/value pair to be truncated, which interferes with the serverβs ability to find the clientβs IP address.
archives.neohapsis.com/archives/bugtraq/2004-10/0299.html
secunia.com/advisories/13013
secur1ty.net/advisories/001
securitytracker.com/id?1011979
web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/
www.osvdb.org/11186
www.securityfocus.com/bid/11551
exchange.xforce.ibmcloud.com/vulnerabilities/17895