A buffer overflow in the M_LoadDefaults function in m_misc.c in id Tech 1 (aka Doom engine) allows arbitrary code execution via an unsafe usage of fscanf, because it does not limit the number of characters to be read in a format argument.
References
Link | Resource |
---|---|
https://github.com/AXDOOMER/doom-vanille/commit/8a6d9a02fa991a91ff90ccdc73b5ceabaa6cb9ec | Patch Third Party Advisory |
https://twitter.com/notrevenant/status/1268654123903340544 | Third Party Advisory |
https://github.com/AXDOOMER/doom-vanille/commit/8a6d9a02fa991a91ff90ccdc73b5ceabaa6cb9ec | Patch Third Party Advisory |
https://twitter.com/notrevenant/status/1268654123903340544 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/AXDOOMER/doom-vanille/commit/8a6d9a02fa991a91ff90ccdc73b5ceabaa6cb9ec - Patch, Third Party Advisory | |
References | () https://twitter.com/notrevenant/status/1268654123903340544 - Third Party Advisory |
Information
Published : 2020-06-24 11:15
Updated : 2024-11-21 05:04
NVD link : CVE-2020-15007
Mitre link : CVE-2020-15007
CVE.ORG link : CVE-2020-15007
JSON object : View
Products Affected
idsoftware
- tech_1
doom_vanille_project
- doom_vanille
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')