CVE-2019-10877Integer Overflow or Wraparound in Teeworlds

Severity
9.8CRITICALNVD
EPSS
0.6%
top 30.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 5
Latest updateMay 14

Description

In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

debiandebian/teeworlds< teeworlds 0.7.2-4 (bookworm)
Debianteeworlds/teeworlds< 0.7.2-4+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r7vf-92cg-qg9c: In Teeworlds 02022-05-14
OSV
CVE-2019-10877: In Teeworlds 02019-04-05

📋Vendor Advisories

1
Debian
CVE-2019-10877: teeworlds - In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/share...2019

💬Community

3
Bugzilla
CVE-2019-10877 teeworlds: integer overflow in function CMap::Load() in engine/shared/map.cpp2019-04-09
Bugzilla
CVE-2019-10877 teeworlds: integer overflow in function CMap::Load() in engine/shared/map.cpp [epel-7]2019-04-09
Bugzilla
CVE-2019-10877 teeworlds: integer overflow in function CMap::Load() in engine/shared/map.cpp [fedora-all]2019-04-09