Quake II server before R1Q2, as used in multiple products, allows remote attackers to bypass IP-based access control rules via a userinfo string that already contains an ip key/value pair but is also long enough to cause a new key/value pair to be truncated, which interferes with the servers ability to find the clients IP address.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Quake_ii_server | Id_software | 3.20 (including) | 3.20 (including) |
| Quake_ii_server | Id_software | 3.21 (including) | 3.21 (including) |