The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5069.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161752.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/06/25/12 | Mailing List Patch Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/75425 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1236010 | Issue Tracking Patch Third Party Advisory VDB Entry |
https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59 | Patch Third Party Advisory |
https://github.com/wesnoth/wesnoth/releases/tag/1.12.4 | Release Notes Third Party Advisory |
https://github.com/wesnoth/wesnoth/releases/tag/1.13.1 | Release Notes Third Party Advisory |
https://gna.org/bugs/?23504 | Broken Link |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-09-26T14:00:00
Updated: 2017-09-26T13:57:02
Reserved: 2015-06-25T00:00:00
Link: CVE-2015-5070
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-09-26T14:29:00.330
Modified: 2017-10-10T14:54:16.533
Link: CVE-2015-5070
JSON object: View
Redhat Information
No data.
CWE