Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-20797

Опубликовано: 18 мая 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in e6y prboom-plus 2.5.1.5. There is a buffer overflow in client and server code responsible for handling received UDP packets, as demonstrated by I_SendPacket or I_SendPacketTo in i_network.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
prboom-plusfixed2:2.5.1.7um+git82-1package
prboom-plusno-dsabusterpackage
prboom-plusno-dsastretchpackage
prboom-plusend-of-lifejessiepackage

Примечания

  • https://logicaltrust.net/blog/2019/10/prboom1.html

  • https://sourceforge.net/p/prboom-plus/bugs/252/

  • https://sourceforge.net/p/prboom-plus/bugs/253/

EPSS

Процентиль: 78%
0.01153
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

An issue was discovered in e6y prboom-plus 2.5.1.5. There is a buffer overflow in client and server code responsible for handling received UDP packets, as demonstrated by I_SendPacket or I_SendPacketTo in i_network.c.

CVSS3: 7.5
nvd
больше 5 лет назад

An issue was discovered in e6y prboom-plus 2.5.1.5. There is a buffer overflow in client and server code responsible for handling received UDP packets, as demonstrated by I_SendPacket or I_SendPacketTo in i_network.c.

suse-cvrf
больше 5 лет назад

Security update for prboom-plus

github
больше 3 лет назад

An issue was discovered in e6y prboom-plus 2.5.1.5. There is a buffer overflow in client and server code responsible for handling received UDP packets, as demonstrated by I_SendPacket or I_SendPacketTo in i_network.c.

EPSS

Процентиль: 78%
0.01153
Низкий