---------------------------------------------------------------------- Secunia Survey Secunia would like to invite you to participate in an electronic survey evolving the usefulness of our mailing lists. To value your effort Secunia will offer you free access to the Secunia Security Manager for three months as well as have a prize draw for an iPod nano. We hope that you will give us a few minutes of your time, as your response will help us provide you with better services in the future. The questionnaire contains 19 questions and it takes approximately 5 minutes to answer the questionnaire. https://ca.secunia.com/survey/?survey_url=kei933wBid2 The survey is being conducted in accordance with the general Secunia Security Policy and your answers will of course be kept strictly confidential. Best regards, Niels Henrik Rasmussen CEO Secunia ---------------------------------------------------------------------- TITLE: Quake 3 Engine "remapShader" Command Buffer Overflow SECUNIA ADVISORY ID: SA19984 VERIFY ADVISORY: http://secunia.com/advisories/19984/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote SOFTWARE: Quake3 Engine 3.x http://secunia.com/product/4653/ DESCRIPTION: landser has reported a vulnerability in Quake 3 Engine, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of the "remapShader" command. This can be exploited to cause a buffer overflow via specially crafted "remapShader" commands sent to a client. Successful exploitation may allow arbitrary code execution, but requires that the user is e.g. tricked into connecting to a malicious game server. The vulnerability has been reported in the following software: * ET 2.60. * Return to Castle Wolfenstein 1.41. * Quake III Arena 1.32b. Other versions may also be affected. SOLUTION: Do not connect to non-trusted game servers. PROVIDED AND/OR DISCOVERED BY: landser ORIGINAL ADVISORY: http://www.milw0rm.com/exploits/1750 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------