Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10877

Опубликовано: 05 апр. 2019
Источник: debian
EPSS Низкий

Описание

In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
teeworldsfixed0.7.2-4package
teeworldsend-of-lifejessiepackage

Примечания

  • https://github.com/teeworlds/teeworlds/issues/2071

  • https://github.com/teeworlds/teeworlds/commit/d25869626a8cfbdd320929ba93ce73abed1402ce

  • https://github.com/teeworlds/teeworlds/commit/e086f4b35b1adf7edc35b4ad332dc7ed1edc5988

EPSS

Процентиль: 71%
0.0069
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 7 лет назад

In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.

CVSS3: 9.8
nvd
почти 7 лет назад

In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.

CVSS3: 9.8
github
больше 3 лет назад

In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.

suse-cvrf
больше 6 лет назад

Security update for teeworlds

EPSS

Процентиль: 71%
0.0069
Низкий