Vulnerability Name: | CVE-2016-9400 (CCN-122529) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-11-16 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2016-11-16 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2020-06-11 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-9400 Source: CCN Type: oss-sec Mailing List, Wed, 16 Nov 2016 20:33:56 +0100 CVE Request: teeworlds: possible remote code execution on teeworlds client Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20161116 CVE Request: teeworlds: possible remote code execution on teeworlds client Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20161117 Re: CVE Request: teeworlds: possible remote code execution on teeworlds client Source: BID Type: Third Party Advisory, VDB Entry 94381 Source: CCN Type: BID-94381 Teeworlds 'client.cpp' Memory Corruption Vulnerability Source: XF Type: UNKNOWN teeworlds-cve20169400-code-exec(122529) Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62 Source: FEDORA Type: Third Party Advisory FEDORA-2016-7470a63cd1 Source: GENTOO Type: Third Party Advisory GLSA-201705-13 Source: CCN Type: Teeworlds Web site Teeworlds Source: CONFIRM Type: Vendor Advisory https://www.teeworlds.com/?page=news&id=12086 Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-9400 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |