Quake II server before R1Q2, as used in multiple products, allows remote attackers to bypass IP-based access control rules via a userinfo string that already contains an ip key/value pair but is also long enough to cause a new key/value pair to be truncated, which interferes with the servers ability to find the clients IP address.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Quake_ii_server | Id_software | 3.20 (including) | 3.20 (including) |
Quake_ii_server | Id_software | 3.21 (including) | 3.21 (including) |