FKIE_CVE-2009-0366
Vulnerability from fkie_nvd - Published: 2009-03-12 15:20 - Updated: 2025-04-09 00:30
Severity ?
Summary
The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FBEEB73-9922-4A87-9EE6-A712D58B831A",
"versionEndIncluding": "1.5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "E0BD9EF4-531F-42FC-B6FB-2EFE9D1DBF27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB817AC-44E4-41CD-BD03-7B5907243FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDC2E2D-581C-4B8C-8DB1-2B34A22C1788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BDB9B969-9AEA-47B8-A2C1-D951DA5A6D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B3ECAC12-E14D-47F6-853C-758584EB4E29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2E47D5-D0F1-4FC4-BC1C-9964BE85741D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CAFC79CA-F9B0-45FD-904C-B11760E11CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "54937870-186F-4342-8658-6F3DA155A53D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9488E868-BFC2-4084-802C-874E41E0AE10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A15CBB13-9B93-4C87-A19E-56FFE900D257",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "63E587C8-E7D8-4FD8-A826-D7BFAE7F270D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED754F0-F2DB-445C-BE11-8525521C7B17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1B0FF72F-A313-4BF1-8E7A-BF7EAA2C5EEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B219D98C-B08A-4BB6-8C5B-E8978823A4C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "18D98006-438D-4DF9-A40A-2B94CE8760EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "07FD8E16-22EC-43BF-8ED3-09236F1C3BB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6F4D957E-7C2A-4062-A3DF-BD02E9CA5D43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D02358E6-E408-4A1C-A391-9F870625C5C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "383AD5F9-7691-4DA8-9DD6-AAB110F54B51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51AF2340-3914-4411-BDC0-6B84548384B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95688481-AC1B-4A58-90D3-E6E76D9E0011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E3FF4FDE-AF17-4BCE-AFEC-CDA138B76231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "30C116EF-BD41-4820-8243-A680EEB70055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C55CF49F-7678-41A9-8A4B-012A5B9EC78D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "952B7487-A920-40B0-BE80-8FA710149E1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2794D70A-2180-424E-BFC7-848413BBA6B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "31232ECA-2AF2-46EF-A9CA-BC692BFE4BBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "17A4E7EF-F4AD-4A96-BD79-664AFDF5AC4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B57DCD88-7731-49A5-AFCB-5C6104025CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "41728562-611D-4F58-AB89-D1887B3564B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "76D1E17F-BC30-4F01-94D5-A64E07B9B03A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "CC3AF888-E2B1-4130-992C-4B7CF6CF4405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "EF25A9ED-8349-4DB0-B719-770E3AE30077",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E4989C0D-A6E6-4317-9640-15E50C62A54F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A9D8C3FF-41EC-4C98-BC7A-5C419559CBA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "CF780D9D-2D07-42BF-A4AB-97F60C73A7B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "A820E98A-D26D-4C9A-B476-8406C88437B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DB71E24E-1A08-491F-8379-FE41AF012E90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B57803-62E1-4F50-92DD-6796C6D60758",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5D83E56-BE05-4DF7-88AD-BC0AD5098415",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "621115C3-5AF6-4709-BB0B-A0FE481C5C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1549F8-FE6A-49E5-BC19-585C4957E061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD5F86E-F65D-4114-9057-A81B360BE143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "256B2C75-47E5-4A8F-9672-B56D17086764",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD02FB1-72CD-42A3-8E7C-910490467A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15627E66-D852-4F68-9C9A-3EAF5B805BC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "415FE737-8F89-463D-9F1D-EF5EDACFCD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1941BB00-8039-4DD8-815A-1AE0CA986C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5D091DF5-3229-43E0-BEC4-754992B8DD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "77F8C56F-1F74-4F40-85D8-DA861DE4DB5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E1E58D08-F602-4BE6-978D-34B58E9188B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "51001322-B437-4A1C-83BA-C8E3C3BCE7CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A991E343-0C44-4F37-80EE-5C0E45EDA909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3C4223A3-6F43-4774-8579-59868FB5074B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5792D1-F342-41F2-B056-D8BA99F5C80E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wesnoth:wesnoth:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8EDB1AAF-2513-4511-9E28-E0E9ACF74C19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document."
},
{
"lang": "es",
"value": "La funci\u00f3n uncompress_buffer en src/server/simple_wml.cpp en Wesnoth anterior a r33069 permite a atacantes remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de un documento WML de gran tama\u00f1o comprimido."
}
],
"id": "CVE-2009-0366",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-03-12T15:20:49.717",
"references": [
{
"source": "cve@mitre.org",
"url": "http://launchpad.net/bugs/335089"
},
{
"source": "cve@mitre.org",
"url": "http://launchpad.net/bugs/336396"
},
{
"source": "cve@mitre.org",
"url": "http://launchpad.net/bugs/cve/2009-0366"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/52672"
},
{
"source": "cve@mitre.org",
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog"
},
{
"source": "cve@mitre.org",
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34236"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34253"
},
{
"source": "cve@mitre.org",
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026r1=32990\u0026r2=33069"
},
{
"source": "cve@mitre.org",
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026view=log"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1737"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34085"
},
{
"source": "cve@mitre.org",
"url": "https://gna.org/bugs/index.php?13037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://launchpad.net/bugs/335089"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://launchpad.net/bugs/336396"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://launchpad.net/bugs/cve/2009-0366"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/52672"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34236"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34253"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026r1=32990\u0026r2=33069"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026view=log"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1737"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34085"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://gna.org/bugs/index.php?13037"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…