Описание
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-0844
- http://forums.wesnoth.org/viewtopic.php?t=41870
- http://forums.wesnoth.org/viewtopic.php?t=41872
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155031.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155968.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156001.html
- http://www.debian.org/security/2015/dsa-3218
Связанные уязвимости
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x ...