Teeworlds Teeworlds 0.4.3

CPE Details

Teeworlds Teeworlds 0.4.3
0.4.3
2019-03-29
17h33 +00:00
2019-03-29
17h33 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:teeworlds:teeworlds:0.4.3:*:*:*:*:*:*:*

Informations

Vendor

teeworlds

Product

teeworlds

Version

0.4.3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-43518 2021-12-15 13h33 +00:00 Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
7.8
High
CVE-2019-20787 2020-04-22 14h19 +00:00 Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.
9.8
Critical
CVE-2018-18541 2018-10-20 20h00 +00:00 In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.
7.5
High
CVE-2016-9400 2017-02-22 15h00 +00:00 The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
9.8
Critical