CVE-2018-1999023Code Injection in Wesnoth-1.14

CWE-94Code Injection8 documents6 sources
Severity
8.8HIGHNVD
EPSS
0.4%
top 37.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 23
Latest updateMay 14

Description

The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

NVDwesnoth/the_battle1.7.01.14.3
debiandebian/wesnoth-1.14< wesnoth-1.14 1:1.14.4-1 (bullseye)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-rv2w-5cww-2mqm: The Battle for Wesnoth Project version 12022-05-14
OSV
CVE-2018-1999023: The Battle for Wesnoth Project version 12018-07-23

📋Vendor Advisories

2
Microsoft
The Battle for Wesnoth Project contains a Code Injection that can result in code execution outside the sandbox2018-07-10
Debian
CVE-2018-1999023: wesnoth-1.14 - The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Inje...2018

💬Community

3
Bugzilla
CVE-2018-1999023 wesnoth: arbitrary code execution/sandbox escape [fedora-all]2018-07-20
Bugzilla
CVE-2018-1999023 wesnoth: arbitrary code execution/sandbox escape [epel-7]2018-07-20
Bugzilla
CVE-2018-1999023 wesnoth: arbitrary code execution/sandbox escape2018-07-20