Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
References
Configurations
History
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
26 Oct 2022, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIYZ7EVY6NZBM7FQF6GVUARYO6MKSEAT/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OS2LI2RHQNUKUT3FKWYHRC27PLRWCHMZ/ - Mailing List, Third Party Advisory | |
First Time |
Fedoraproject
Fedoraproject fedora |
|
CPE | cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* |
06 Aug 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Dec 2021, 21:18
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/teeworlds/teeworlds/issues/2981 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MISC) https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.8 |
CWE | CWE-120 | |
CPE | cpe:2.3:a:teeworlds:teeworlds:*:*:*:*:*:*:*:* |
15 Dec 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-15 15:15
Updated : 2023-12-10 14:09
NVD link : CVE-2021-43518
Mitre link : CVE-2021-43518
CVE.ORG link : CVE-2021-43518
JSON object : View
Products Affected
teeworlds
- teeworlds
fedoraproject
- fedora
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')