Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9400

Опубликовано: 22 фев. 2017
Источник: debian
EPSS Низкий

Описание

The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
teeworldsfixed0.6.4+dfsg-1package
teeworldsno-dsajessiepackage
teeworldsend-of-lifewheezypackage

Примечания

  • https://www.teeworlds.com/?page=news&id=12086

  • https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62 (0.6.4-release)

  • https://www.openwall.com/lists/oss-security/2016/11/16/8

EPSS

Процентиль: 87%
0.03415
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.

CVSS3: 9.8
nvd
почти 9 лет назад

The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.

CVSS3: 9.8
github
больше 3 лет назад

The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.

EPSS

Процентиль: 87%
0.03415
Низкий