Debian Teeworlds vulnerabilities
10 known vulnerabilities affecting debian/teeworlds.
Total CVEs
10
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH4MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2023-31517HIGHCVSS 7.52023
CVE-2023-31517 [HIGH] CVE-2023-31517: teeworlds - A memory leak in the component CConsole::Chain of Teeworlds v0.7.5 allows attack...
A memory leak in the component CConsole::Chain of Teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via opening a crafted file.
Scope: local
bookworm: open
bullseye: open
forky: open
sid: open
trixie: open
debian
CVE-2023-31518MEDIUMCVSS 5.52023
CVE-2023-31518 [MEDIUM] CVE-2023-31518: teeworlds - A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0....
A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
Scope: local
bookworm: open
bullseye: open
forky: open
sid: open
trixie: open
debian
CVE-2021-43518HIGHCVSS 7.8fixed in teeworlds 0.7.5-2 (bookworm)2021
CVE-2021-43518 [HIGH] CVE-2021-43518: teeworlds - Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map pars...
Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
Scope: local
bookworm: resolved (fixed in 0.7.5-2)
bullseye:
debian
CVE-2020-12066HIGHCVSS 7.5fixed in teeworlds 0.7.5-1 (bookworm)2020
CVE-2020-12066 [HIGH] CVE-2020-12066: teeworlds - CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 all...
CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.
Scope: local
bookworm: resolved (fixed in 0.7.5-1)
bullseye: resolved (fixed in 0.7.5-1)
forky: resolved (fixed in 0.7.5-1)
sid: resolved (fixed in 0.7.5-1)
trixie: resolved (fixed in 0.7.5-1)
debian
CVE-2019-10878CRITICALCVSS 9.8fixed in teeworlds 0.7.2-5 (bookworm)2019
CVE-2019-10878 [CRITICAL] CVE-2019-10878: teeworlds - In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData()...
In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution.
Scope: local
bookworm: resolved (fixed in 0.7.2-5)
bullseye: resolved (fixed in 0
debian
CVE-2019-10879CRITICALCVSS 9.8fixed in teeworlds 0.7.2-4 (bookworm)2019
CVE-2019-10879 [CRITICAL] CVE-2019-10879: teeworlds - In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in e...
In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp that can lead to a buffer overflow and possibly remote code execution, because size-related multiplications are mishandled.
Scope: local
bookworm: resolved (fixed in 0.7.2-4)
bullseye: resolved (fixed in 0.7.2-4)
forky: resolved (fixed in 0.7.2-4)
sid: res
debian
CVE-2019-10877CRITICALCVSS 9.8fixed in teeworlds 0.7.2-4 (bookworm)2019
CVE-2019-10877 [CRITICAL] CVE-2019-10877: teeworlds - In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/share...
In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.
Scope: local
bookworm: resolved (fixed in 0.7.2-4)
bullseye: resolved (fixed in 0.7.2-4)
forky: resolved (fixed in 0.7.2-4)
sid: resolved (fixed in 0.7.2-4)
trixie: resolved (fix
debian
CVE-2018-18541HIGHCVSS 7.5fixed in teeworlds 0.7.0-1 (bookworm)2018
CVE-2018-18541 [HIGH] CVE-2018-18541: teeworlds - In Teeworlds before 0.6.5, connection packets could be forged. There was no chal...
In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.
Scope: local
bookworm: resolved (fixed in 0.7.0-1)
bullseye: r
debian
CVE-2016-9400CRITICALCVSS 9.8fixed in teeworlds 0.6.4+dfsg-1 (bookworm)2016
CVE-2016-9400 [CRITICAL] CVE-2016-9400: teeworlds - The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds...
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
Scope: local
bookworm: resolved (fixed in 0.6.4+dfsg-1)
bullseye: resolved (fixed in 0.6.4+dfsg-1)
forky: resolved (fixed in 0.
debian
CVE-2014-9351MEDIUMCVSS 6.4fixed in teeworlds 0.6.2+dfsg-2 (bookworm)2014
CVE-2014-9351 [MEDIUM] CVE-2014-9351: teeworlds - engine/server/server.cpp in Teeworlds 0.6.x before 0.6.3 allows remote attackers...
engine/server/server.cpp in Teeworlds 0.6.x before 0.6.3 allows remote attackers to read memory and cause a denial of service (crash) via unspecified vectors.
Scope: local
bookworm: resolved (fixed in 0.6.2+dfsg-2)
bullseye: resolved (fixed in 0.6.2+dfsg-2)
forky: resolved (fixed in 0.6.2+dfsg-2)
sid: resolved (fixed in 0.6.2+dfsg-2)
trixie: resolved (fixed in 0.6
debian