Teeworlds Teeworlds 0.7.2

CPE Details

Teeworlds Teeworlds 0.7.2
0.7.2
2019-04-09
16h36 +00:00
2019-04-09
16h36 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:teeworlds:teeworlds:0.7.2:*:*:*:*:*:*:*

Informations

Vendor

teeworlds

Product

teeworlds

Version

0.7.2

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-43518 2021-12-15 13h33 +00:00 Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
7.8
Haute
CVE-2020-12066 2020-04-22 14h20 +00:00 CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.
7.5
Haute
CVE-2019-20787 2020-04-22 14h19 +00:00 Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.
9.8
Critique
CVE-2019-10879 2019-04-05 02h31 +00:00 In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp that can lead to a buffer overflow and possibly remote code execution, because size-related multiplications are mishandled.
9.8
Critique
CVE-2019-10878 2019-04-05 02h31 +00:00 In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution.
9.8
Critique
CVE-2019-10877 2019-04-05 02h31 +00:00 In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.
9.8
Critique