mirror of
https://github.com/ioquake/jedi-academy.git
synced 2024-11-22 20:31:26 +00:00
832b4342a8
CVE-2006-2236 Buffer overflow in the Quake 3 Engine, as used by (1) ET 2.60, (2) Return to Castle Wolfenstein 1.41, and (3) Quake III Arena 1.32b allows remote attackers to execute arbitrary commands via a long remapShader command. from Thilo Schulz in ioquake3 svn 765 git d21411452ef32b86c0b79ddcaf49221701dcdb07 Add string length checking to function COM_StripExtension. This fixes the R_RemapShader buffer overflow exploit that can be found here: http://milw0rm.com/exploits/1750 |
||
---|---|---|
.. | ||
BlockStream.cpp | ||
blockstream.h | ||
GameInterface.cpp | ||
GameInterface.h | ||
icarus.h | ||
Instance.cpp | ||
instance.h | ||
Interface.cpp | ||
interface.h | ||
Interpreter.cpp | ||
interpreter.h | ||
Memory.cpp | ||
module.h | ||
Q3_Interface.cpp | ||
Q3_Interface.h | ||
Q3_Registers.cpp | ||
Q3_Registers.h | ||
Sequence.cpp | ||
sequence.h | ||
Sequencer.cpp | ||
sequencer.h | ||
TaskManager.cpp | ||
taskmanager.h | ||
Tokenizer.cpp | ||
tokenizer.h |