Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
References
Link | Resource |
---|---|
https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/ | Exploit Third Party Advisory |
https://github.com/teeworlds/teeworlds/issues/2981 | Exploit Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OS2LI2RHQNUKUT3FKWYHRC27PLRWCHMZ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIYZ7EVY6NZBM7FQF6GVUARYO6MKSEAT/ | Mailing List Third Party Advisory |
Information
Published : 2021-12-15 07:15
Updated : 2022-10-25 19:31
NVD link : CVE-2021-43518
Mitre link : CVE-2021-43518
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
teeworlds
- teeworlds
fedoraproject
- fedora