Teeworlds Teeworlds

Do you want an email whenever new security vulnerabilities are reported in Teeworlds?

By the Year

In 2024 there have been 0 vulnerabilities in Teeworlds . Last year Teeworlds had 2 security vulnerabilities published. Right now, Teeworlds is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 2 6.50
2022 0 0.00
2021 1 7.80
2020 2 8.65
2019 3 9.80
2018 1 7.50

It may take a day or so for new Teeworlds vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Teeworlds Security Vulnerabilities

A memory leak in the component CConsole::Chain of Teeworlds v0.7.5

CVE-2023-31517 7.5 - High - May 23, 2023

A memory leak in the component CConsole::Chain of Teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via opening a crafted file.

Memory Leak

A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5

CVE-2023-31518 5.5 - Medium - May 23, 2023

A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.

Dangling pointer

Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow

CVE-2021-43518 7.8 - High - December 15, 2021

Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.

Classic Buffer Overflow

Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.

CVE-2019-20787 9.8 - Critical - April 22, 2020

Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.

Integer Overflow or Wraparound

CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5

CVE-2020-12066 7.5 - High - April 22, 2020

CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.

Improper Input Validation

In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp

CVE-2019-10877 9.8 - Critical - April 05, 2019

In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.

Integer Overflow or Wraparound

In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp

CVE-2019-10878 9.8 - Critical - April 05, 2019

In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution.

Memory Corruption

In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp

CVE-2019-10879 9.8 - Critical - April 05, 2019

In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp that can lead to a buffer overflow and possibly remote code execution, because size-related multiplications are mishandled.

Integer Overflow or Wraparound

In Teeworlds before 0.6.5, connection packets could be forged

CVE-2018-18541 7.5 - High - October 20, 2018

In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.

Improper Input Validation

The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4

CVE-2016-9400 9.8 - Critical - February 22, 2017

The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.

Buffer Overflow

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Fedora Project Fedora or by Teeworlds? Click the Watch button to subscribe.

Teeworlds
Vendor

Teeworlds
Product

subscribe