Lucene search

K
debianDebianDEBIAN:DLA-297-1:66C7B
HistoryAug 22, 2015 - 9:19 a.m.

[SECURITY] [DLA 297-1] wesnoth-1.8 security update

2015-08-2209:19:10
lists.debian.org
7

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.2 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.4%

Package : wesnoth-1.8
Version : 1:1.8.5-1+deb6u2
CVE ID : CVE-2015-5069 CVE-2015-5070

Wesnoth implements a text preprocessing language that is used in
conjunction with its own game scripting language. It also has a
built-in Lua interpreter and API.
Both the Lua API and the preprocessor make use of the same function
(filesystem::get_wml_location()) to resolve file paths so that only
content from the user's data directory can be read.

However, the function did not explicitly disallow files with the .pbl
extension. The contents of these files could thus be stored in saved
game files or even transmitted directly to other users in a networked
game. Among the information that's compromised is a user-defined
passphrase used to authenticate uploads to the game's content server.

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.2 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.4%