CVE-2005-0983 (CNNVD-200505-282)
MEDIUM
中文标题:
Quake 3远程拒绝服务漏洞
英文标题:
Quake 3 engine, as used in multiple games, allows remote attackers to cause a denial of service (cli...
CVSS分数:
5.0
发布时间:
2005-04-05 04:00:00
漏洞类型:
授权问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
游戏引擎处理长于1022个字符的命令时存在漏洞,远程攻击者可能用来执行拒绝服务攻击。
英文描述:
Quake 3 engine, as used in multiple games, allows remote attackers to cause a denial of service (client disconnect) via a long message, which is not properly truncated and causes the engine to process the remaining data as if it were network data.
CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| activision | call_of_duty | 1.4 | - | - |
cpe:2.3:a:activision:call_of_duty:1.4:*:*:*:*:*:*:*
|
| activision | call_of_duty | 1.5b | - | - |
cpe:2.3:a:activision:call_of_duty:1.5b:*:*:*:*:*:*:*
|
| activision | call_of_duty_united_offensive | 1.41 | - | - |
cpe:2.3:a:activision:call_of_duty_united_offensive:1.41:*:*:*:*:*:*:*
|
| activision | call_of_duty_united_offensive | 1.51b | - | - |
cpe:2.3:a:activision:call_of_duty_united_offensive:1.51b:*:*:*:*:*:*:*
|
| activision | return_to_castle_wolfenstein | 1.0 | - | - |
cpe:2.3:a:activision:return_to_castle_wolfenstein:1.0:*:*:*:*:*:*:*
|
| activision | return_to_castle_wolfenstein | 1.1 | - | - |
cpe:2.3:a:activision:return_to_castle_wolfenstein:1.1:*:*:*:*:*:*:*
|
| id_software | quake_3_arena | 1.1.7 | - | - |
cpe:2.3:a:id_software:quake_3_arena:1.1.7:*:*:*:*:*:*:*
|
| id_software | quake_3_arena | 1.16 | - | - |
cpe:2.3:a:id_software:quake_3_arena:1.16:*:*:*:*:*:*:*
|
| id_software | quake_3_arena | 1.31 | - | - |
cpe:2.3:a:id_software:quake_3_arena:1.31:*:*:*:*:*:*:*
|
| id_software | quake_3_arena_server | 1.29f | - | - |
cpe:2.3:a:id_software:quake_3_arena_server:1.29f:*:*:*:*:*:*:*
|
| id_software | quake_3_arena_server | 1.29g | - | - |
cpe:2.3:a:id_software:quake_3_arena_server:1.29g:*:*:*:*:*:*:*
|
| id_software | quake_3_engine | * | - | - |
cpe:2.3:a:id_software:quake_3_engine:*:*:*:*:*:*:*:*
|
| id_software | wolfenstein_enemy_territory | 1.0.2 | - | - |
cpe:2.3:a:id_software:wolfenstein_enemy_territory:1.0.2:*:*:*:*:*:*:*
|
| id_software | wolfenstein_enemy_territory | 2.56 | - | - |
cpe:2.3:a:id_software:wolfenstein_enemy_territory:2.56:*:*:*:*:*:*:*
|
| lucasarts | star_wars_jedi_knight_ii_jedi_outcast | 1.0.4 | - | - |
cpe:2.3:a:lucasarts:star_wars_jedi_knight_ii_jedi_outcast:1.0.4:*:*:*:*:*:*:*
|
| lucasarts | star_wars_jedi_knight_jedi_academy | 1.0.11 | - | - |
cpe:2.3:a:lucasarts:star_wars_jedi_knight_jedi_academy:1.0.11:*:*:*:*:*:*:*
|
| raven_software | soldier_of_fortune_2 | 1.0.2 | - | - |
cpe:2.3:a:raven_software:soldier_of_fortune_2:1.0.2:*:*:*:*:*:*:*
|
| raven_software | soldier_of_fortune_2 | 1.0.3 | - | - |
cpe:2.3:a:raven_software:soldier_of_fortune_2:1.0.3:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
CVSS评分详情
5.0
MEDIUM
CVSS向量:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS版本:
2.0
机密性
NONE
完整性
NONE
可用性
PARTIAL
时间信息
发布时间:
2005-04-05 04:00:00
修改时间:
2024-08-07 21:35:58
创建时间:
2025-11-11 15:32:25
更新时间:
2025-11-11 15:48:58
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-0983 |
2025-11-11 15:17:33 | 2025-11-11 07:32:25 |
| NVD | nvd_CVE-2005-0983 |
2025-11-11 14:51:18 | 2025-11-11 07:41:11 |
| CNNVD | cnnvd_CNNVD-200505-282 |
2025-11-11 15:08:46 | 2025-11-11 07:48:58 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:48:58
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200505-282; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200505-282
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:11
cvss_score: 未提取 → 5.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:N/I:N/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 18; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:N/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 18
- data_sources: ['cve'] -> ['cve', 'nvd']