← Voltar para CVEs
CVE-2016-9400
CRITICAL9.8
Descricao
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/22/2017
Ultima modificacao4/20/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
fedoraproject:fedorateeworlds:teeworlds
Fraquezas (CWE)
CWE-119
Referencias
http://www.openwall.com/lists/oss-security/2016/11/16/8(security@debian.org)
http://www.openwall.com/lists/oss-security/2016/11/17/8(security@debian.org)
http://www.securityfocus.com/bid/94381(security@debian.org)
https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62(security@debian.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C4JNSBXXPE7O32ZMFK7D7YL6EKLG7PRV/(security@debian.org)
https://security.gentoo.org/glsa/201705-13(security@debian.org)
https://www.teeworlds.com/?page=news&id=12086(security@debian.org)
http://www.openwall.com/lists/oss-security/2016/11/16/8(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/11/17/8(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94381(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C4JNSBXXPE7O32ZMFK7D7YL6EKLG7PRV/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201705-13(af854a3a-2127-422b-91ae-364da2661108)
https://www.teeworlds.com/?page=news&id=12086(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.