A buffer overflow in the M_LoadDefaults function in m_misc.c in id Tech 1 (aka Doom engine) allows arbitrary code execution via an unsafe usage of fscanf, because it does not limit the number of characters to be read in a format argument.
References
Link | Resource |
---|---|
https://twitter.com/notrevenant/status/1268654123903340544 | Third Party Advisory |
https://github.com/AXDOOMER/doom-vanille/commit/8a6d9a02fa991a91ff90ccdc73b5ceabaa6cb9ec | Patch Third Party Advisory |
Information
Published : 2020-06-24 04:15
Updated : 2020-07-08 07:33
NVD link : CVE-2020-15007
Mitre link : CVE-2020-15007
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
doom_vanille_project
- doom_vanille
idsoftware
- tech_1