Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
References
| Link | Resource |
|---|---|
| https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/ | Exploit Third Party Advisory |
| https://github.com/teeworlds/teeworlds/issues/2981 | Exploit Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2021-12-15 15:15
Updated : 2021-12-27 21:18
NVD link : CVE-2021-43518
Mitre link : CVE-2021-43518
JSON object : View
Products Affected
teeworlds
- teeworlds
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
