Описание
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- ExploitPatchThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- ExploitPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:chocolate-doom:chocolate_doom:3.0.0:-:*:*:*:*:*:*
cpe:2.3:a:chocolate-doom:crispy_doom:5.8.0:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
EPSS
Процентиль: 69%
0.00603
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-120
Связанные уязвимости
CVSS3: 9.8
ubuntu
больше 5 лет назад
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
CVSS3: 9.8
debian
больше 5 лет назад
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't valid ...
CVSS3: 9.8
github
больше 3 лет назад
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
EPSS
Процентиль: 69%
0.00603
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-120