CVE-2011-1932
Published Dec 5, 2011
Last updated 3 years ago
Overview
- Description
- Directory traversal vulnerability in io/filesystem/filesystem.cc in Widelands before 15.1 might allow remote attackers to overwrite arbitrary files via . (dot) characters in a pathname that is used for a file transfer in an Internet game.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:widelands:widelands:-:build1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C310EED8-E0FE-4E51-AF0A-6A53924DC4BD" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "054E4DC2-A9F7-4680-A33C-B816AEE0A148" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build10_release_candidate:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B2DF3D7-AD20-4578-A730-C2515038A97D" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFF3C32F-3C38-4112-B575-6A6F91173CFF" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build11_release_candidate:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B45B376-434B-456B-B491-CF7B0BB0F597" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB91F6CB-0B0D-435E-8CC9-7405053966E9" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build12_release_candidate:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "208433B7-008C-4771-8508-7640782F018F" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF11D5F6-5103-4561-A1BE-2761AEDF96F8" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build13_release_candidate:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17E65533-7F5C-4CA3-9157-063E93F1E6AB" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build13_release_candidate2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6803C19-950C-4A27-9B07-DFA3512BBB23" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F70B6239-4BD3-4E90-80E6-BBBFD1518A56" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build14_release_candidate:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76F3B6EA-CDB0-47ED-A6BF-BE5F99467DA7" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B88CCD70-B9DB-47DF-AF80-84ABC905E272" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "460D9138-AA35-4A25-A5EB-1613BE29F5C5" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD22A431-E827-4621-94CA-4A9F2A48F025" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "820E897A-D5C7-49E2-884F-2A722FA36B48" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40FE6D11-D0A5-4E9B-A990-BB73FCD095E0" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D9D5D4C-ADF9-483E-8318-66866B2863E3" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C1AE263-930F-4F2D-B6F5-AF96DA7239D9" }, { "criteria": "cpe:2.3:a:widelands:widelands:-:build9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9603E399-1F1D-4C35-82C9-4382F1A70926" } ], "operator": "OR" } ] } ]