Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 829305 (CVE-2021-43518) - games-action/teeworlds: code execution via malicious map file
Summary: games-action/teeworlds: code execution via malicious map file
Status: CONFIRMED
Alias: CVE-2021-43518
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://github.com/teeworlds/teeworld...
Whiteboard: ~2 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2021-12-15 23:52 UTC by John Helmert III
Modified: 2022-08-16 19:57 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-12-15 23:52:00 UTC
CVE-2021-43518 (https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/):

Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.

No fix upstream as of yet.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-16 19:57:40 UTC
There is now a patch: https://github.com/teeworlds/teeworlds/commit/7e81ae1aac5dc4dc80b064262a4cef57d1361ce4