Teeworlds
By the Year
In 2024 there have been 0 vulnerabilities in Teeworlds . Last year Teeworlds had 2 security vulnerabilities published. Right now, Teeworlds is on track to have less security vulnerabilities in 2024 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 2 | 6.50 |
2022 | 0 | 0.00 |
2021 | 1 | 7.80 |
2020 | 2 | 8.65 |
2019 | 3 | 9.80 |
2018 | 1 | 7.50 |
It may take a day or so for new Teeworlds vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Teeworlds Security Vulnerabilities
A memory leak in the component CConsole::Chain of Teeworlds v0.7.5
CVE-2023-31517
7.5 - High
- May 23, 2023
A memory leak in the component CConsole::Chain of Teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via opening a crafted file.
Memory Leak
A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5
CVE-2023-31518
5.5 - Medium
- May 23, 2023
A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
Dangling pointer
Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow
CVE-2021-43518
7.8 - High
- December 15, 2021
Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
Classic Buffer Overflow
Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.
CVE-2019-20787
9.8 - Critical
- April 22, 2020
Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.
Integer Overflow or Wraparound
CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5
CVE-2020-12066
7.5 - High
- April 22, 2020
CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.
Improper Input Validation
In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp
CVE-2019-10877
9.8 - Critical
- April 05, 2019
In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.
Integer Overflow or Wraparound
In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp
CVE-2019-10878
9.8 - Critical
- April 05, 2019
In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution.
Memory Corruption
In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp
CVE-2019-10879
9.8 - Critical
- April 05, 2019
In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp that can lead to a buffer overflow and possibly remote code execution, because size-related multiplications are mishandled.
Integer Overflow or Wraparound
In Teeworlds before 0.6.5, connection packets could be forged
CVE-2018-18541
7.5 - High
- October 20, 2018
In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.
Improper Input Validation
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4
CVE-2016-9400
9.8 - Critical
- February 22, 2017
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
Buffer Overflow