Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-43518

Опубликовано: 15 дек. 2021
Источник: debian

Описание

Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
teeworldsfixed0.7.5-2package
teeworldsno-dsabullseyepackage
teeworldsno-dsabusterpackage

Примечания

  • https://github.com/teeworlds/teeworlds/issues/2981

  • https://github.com/teeworlds/teeworlds/pull/3018

  • https://github.com/teeworlds/teeworlds/commit/91e5492d4c210f82f1ca6b43a73417fef5463368

  • https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 4 лет назад

Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.

CVSS3: 7.8
nvd
около 4 лет назад

Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.

CVSS3: 7.8
github
около 4 лет назад

Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.