Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-26825

Опубликовано: 08 фев. 2021
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8
CVSS3: 7.8

Описание

An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

3.6+ds-2
esm-apps/focal

released

3.2-stable-2ubuntu0.1~esm1
esm-apps/jammy

released

3.2.3-stable-1ubuntu0.1~esm1
esm-apps/noble

not-affected

3.5.2-stable-2build4
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage
groovy

ignored

end of life
hirsute

ignored

end of life
impish

ignored

end of life

Показывать по

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
почти 5 лет назад

An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

CVSS3: 7.8
debian
почти 5 лет назад

An integer overflow issue exists in Godot Engine up to v3.2 that can b ...

github
больше 3 лет назад

An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

6.8 Medium

CVSS2

7.8 High

CVSS3