Teeworlds

Teeworlds

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 23.05.2023 20:15:09
  • Zuletzt bearbeitet 21.11.2024 08:01:59

A memory leak in the component CConsole::Chain of Teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via opening a crafted file.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 23.05.2023 20:15:09
  • Zuletzt bearbeitet 31.01.2025 14:15:33

A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 15.12.2021 15:15:10
  • Zuletzt bearbeitet 21.11.2024 06:29:20

Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite clien...

  • EPSS 0.68%
  • Veröffentlicht 22.04.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:39:21

Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.

  • EPSS 5.73%
  • Veröffentlicht 22.04.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:12

CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.

  • EPSS 0.7%
  • Veröffentlicht 05.04.2019 06:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:01

In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.

  • EPSS 2.66%
  • Veröffentlicht 05.04.2019 05:29:03
  • Zuletzt bearbeitet 21.11.2024 04:20:01

In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resul...

Exploit
  • EPSS 4.62%
  • Veröffentlicht 05.04.2019 05:29:03
  • Zuletzt bearbeitet 21.11.2024 04:20:02

In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp that can lead to a buffer overflow and possibly remote code execution, because size-related multiplications are mishandled.

  • EPSS 1.88%
  • Veröffentlicht 20.10.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:07

In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use the...

  • EPSS 2.72%
  • Veröffentlicht 22.02.2017 16:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.