Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14938

Опубликовано: 23 июн. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in map.c in FreedroidRPG 1.0rc2. It assumes lengths of data sets read from saved game files. It copies data from a file into a fixed-size heap-allocated buffer without size verification, leading to a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freedroidrpgfixed1.0-1package
freedroidrpgno-dsabullseyepackage
freedroidrpgno-dsabusterpackage
freedroidrpgno-dsastretchpackage
freedroidrpgend-of-lifejessiepackage

Примечания

  • https://bugs.freedroid.org/b/issue952

  • https://bugs.freedroid.org/b/issue967

  • https://logicaltrust.net/blog/2020/02/freedroid.html

EPSS

Процентиль: 69%
0.006
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

An issue was discovered in map.c in FreedroidRPG 1.0rc2. It assumes lengths of data sets read from saved game files. It copies data from a file into a fixed-size heap-allocated buffer without size verification, leading to a heap-based buffer overflow.

CVSS3: 9.8
nvd
больше 5 лет назад

An issue was discovered in map.c in FreedroidRPG 1.0rc2. It assumes lengths of data sets read from saved game files. It copies data from a file into a fixed-size heap-allocated buffer without size verification, leading to a heap-based buffer overflow.

github
больше 3 лет назад

An issue was discovered in map.c in FreedroidRPG 1.0rc2. It assumes lengths of data sets read from saved game files. It copies data from a file into a fixed-size heap-allocated buffer without size verification, leading to a heap-based buffer overflow.

EPSS

Процентиль: 69%
0.006
Низкий