UBUNTU-CVE-2017-11721

Source
https://ubuntu.com/security/CVE-2017-11721
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-11721.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-11721
Upstream
Published
2017-08-03T08:29:00Z
Modified
2025-07-16T07:35:47.698345Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Buffer overflow in ioquake3 before 2017-08-02 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted packet.

References

Affected packages

Ubuntu:Pro:16.04:LTS / ioquake3

Package

Name
ioquake3
Purl
pkg:deb/ubuntu/ioquake3@1.36+u20160122+dfsg1-1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.36+u20150710+dfsg1-1
1.36+u20150926+dfsg1-1
1.36+u20151017+dfsg1-1
1.36+u20160122+dfsg1-1

Ubuntu:18.04:LTS / ioquake3

Package

Name
ioquake3
Purl
pkg:deb/ubuntu/ioquake3@1.36+u20170803+dfsg1-1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.36+u20170803+dfsg1-1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "ioquake3",
            "binary_version": "1.36+u20170803+dfsg1-1"
        },
        {
            "binary_name": "ioquake3-dbgsym",
            "binary_version": "1.36+u20170803+dfsg1-1"
        },
        {
            "binary_name": "ioquake3-server",
            "binary_version": "1.36+u20170803+dfsg1-1"
        },
        {
            "binary_name": "ioquake3-server-dbgsym",
            "binary_version": "1.36+u20170803+dfsg1-1"
        }
    ]
}

Ubuntu:18.04:LTS / iortcw

Package

Name
iortcw
Purl
pkg:deb/ubuntu/iortcw@1.51+dfsg1-3?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.51+dfsg1-3

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "rtcw",
            "binary_version": "1.51+dfsg1-3"
        },
        {
            "binary_name": "rtcw-common",
            "binary_version": "1.51+dfsg1-3"
        },
        {
            "binary_name": "rtcw-common-dbgsym",
            "binary_version": "1.51+dfsg1-3"
        },
        {
            "binary_name": "rtcw-dbgsym",
            "binary_version": "1.51+dfsg1-3"
        },
        {
            "binary_name": "rtcw-server",
            "binary_version": "1.51+dfsg1-3"
        },
        {
            "binary_name": "rtcw-server-dbgsym",
            "binary_version": "1.51+dfsg1-3"
        }
    ]
}