SB2019082601 - OpenSUSE Linux update for teeworlds
Published: August 26, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Spoofing attack (CVE-ID: CVE-2018-18541)
The vulnerability allows a remote attacker to conduct IP spoofing attack.
The vulnerability exists due to connection packets can be forged when there was no challenge-response involved in the connection build up. A remote attacker can send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.
2) Integer overflow (CVE-ID: CVE-2019-10877)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the multiplication of width and height were mishandled in the "CMap::Load()" in the "engine/shared/map.cpp". A remote attacker can trigger buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Out-of-bounds write (CVE-ID: CVE-2019-10878)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in the "CDataFileReader::GetData()" and "CDataFileReader::ReplaceData()" and related functions in engine/shared/datafile.cpp. A remote attacker can trigger out-of-bounds pointer write and execute arbitrary code on the target system.
4) Integer overflow (CVE-ID: CVE-2019-10879)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the size-related multiplications were mishandled in the "CDataFileReader::Open()" in "engine/shared/datafile.cpp". A remote attacker can trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.