Vulnerabilities
Vulnerable Software
Teeworlds:  >> Teeworlds  Security Vulnerabilities
A memory leak in the component CConsole::Chain of Teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via opening a crafted file.
CVSS Score
7.5
EPSS Score
0.001
Published
2023-05-23
A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
CVSS Score
5.5
EPSS Score
0.0
Published
2023-05-23
Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
CVSS Score
7.8
EPSS Score
0.001
Published
2021-12-15
Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.
CVSS Score
9.8
EPSS Score
0.007
Published
2020-04-22
CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.
CVSS Score
7.5
EPSS Score
0.046
Published
2020-04-22
In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.
CVSS Score
9.8
EPSS Score
0.007
Published
2019-04-05
In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution.
CVSS Score
9.8
EPSS Score
0.027
Published
2019-04-05
In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp that can lead to a buffer overflow and possibly remote code execution, because size-related multiplications are mishandled.
CVSS Score
9.8
EPSS Score
0.046
Published
2019-04-05
In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.
CVSS Score
7.5
EPSS Score
0.02
Published
2018-10-20
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
CVSS Score
9.8
EPSS Score
0.027
Published
2017-02-22


Contact Us

Shodan ® - All rights reserved