CVE-2016-9400Improper Restriction of Operations within the Bounds of a Memory Buffer in Teeworlds

Severity
9.8CRITICALNVD
EPSS
3.4%
top 12.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 22
Latest updateMay 13

Description

The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

debiandebian/teeworlds< teeworlds 0.6.4+dfsg-1 (bookworm)
NVDteeworlds/teeworlds< 0.6.4
Debianteeworlds/teeworlds< 0.6.4+dfsg-1+3

Also affects: Fedora 23

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jv4p-f6mv-66w4: The CClient::ProcessServerPacket method in engine/client/client2022-05-13
OSV
CVE-2016-9400: The CClient::ProcessServerPacket method in engine/client/client2017-02-22

📋Vendor Advisories

1
Debian
CVE-2016-9400: teeworlds - The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds...2016

💬Community

3
Bugzilla
CVE-2016-9400 teeworlds: Possible remote code execution on teeworlds client2016-11-18
Bugzilla
CVE-2016-9400 teeworlds: Possible remote code execution on teeworlds client [fedora-all]2016-11-18
Bugzilla
CVE-2016-9400 teeworlds: Possible remote code execution on teeworlds client [epel-7]2016-11-18