CVE-2015-5069

The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161752.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/06/25/12 Mailing List Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/75424 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1236010 Issue Tracking Third Party Advisory VDB Entry
https://github.com/wesnoth/wesnoth/commit/f8914468182e8d0a1551b430c0879ba236fe4d6d Patch Third Party Advisory
https://github.com/wesnoth/wesnoth/releases/tag/1.12.3 Release Notes Third Party Advisory
https://github.com/wesnoth/wesnoth/releases/tag/1.13.1 Release Notes Third Party Advisory
https://gna.org/bugs/?23504 Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161752.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/06/25/12 Mailing List Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/75424 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1236010 Issue Tracking Third Party Advisory VDB Entry
https://github.com/wesnoth/wesnoth/commit/f8914468182e8d0a1551b430c0879ba236fe4d6d Patch Third Party Advisory
https://github.com/wesnoth/wesnoth/releases/tag/1.12.3 Release Notes Third Party Advisory
https://github.com/wesnoth/wesnoth/releases/tag/1.13.1 Release Notes Third Party Advisory
https://gna.org/bugs/?23504 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wesnoth:battle_for_wesnoth:*:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:battle_for_wesnoth:1.13.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-09-26 14:29

Updated : 2025-04-20 01:37


NVD link : CVE-2015-5069

Mitre link : CVE-2015-5069

CVE.ORG link : CVE-2015-5069


JSON object : View

Products Affected

wesnoth

  • battle_for_wesnoth

fedoraproject

  • fedora
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor