Описание
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| crispy-doom | fixed | 5.9.0-1 | package | |
| crispy-doom | no-dsa | buster | package | |
| chocolate-doom | fixed | 3.0.1-1 | package | |
| chocolate-doom | fixed | 3.0.0-4+deb10u1 | buster | package |
| chocolate-doom | end-of-life | stretch | package | |
| chocolate-doom | end-of-life | jessie | package |
Примечания
https://github.com/chocolate-doom/chocolate-doom/issues/1293
https://github.com/chocolate-doom/chocolate-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1
https://github.com/fabiangreffrath/crispy-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1
EPSS
Связанные уязвимости
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
EPSS