SB2019082601 - OpenSUSE Linux update for teeworlds 



SB2019082601 - OpenSUSE Linux update for teeworlds

Published: August 26, 2019

Security Bulletin ID SB2019082601
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 75% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Spoofing attack (CVE-ID: CVE-2018-18541)

The vulnerability allows a remote attacker to conduct IP spoofing attack.

The vulnerability exists due to connection packets can be forged when there was no challenge-response involved in the connection build up. A remote attacker can send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.


2) Integer overflow (CVE-ID: CVE-2019-10877)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the multiplication of width and height were mishandled in the "CMap::Load()" in the "engine/shared/map.cpp". A remote attacker can trigger buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Out-of-bounds write (CVE-ID: CVE-2019-10878)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the "CDataFileReader::GetData()" and "CDataFileReader::ReplaceData()" and related functions in engine/shared/datafile.cpp. A remote attacker can trigger out-of-bounds pointer write and execute arbitrary code on the target system.


4) Integer overflow (CVE-ID: CVE-2019-10879)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the size-related multiplications were mishandled in the "CDataFileReader::Open()" in "engine/shared/datafile.cpp". A remote attacker can trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.