4 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

08 Feb 2021 — An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash. Se presenta un problema de desbo... • https://github.com/godotengine/godot/pull/45702 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

08 Feb 2021 — A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash. Se presenta un problema de desbordamiento de la pila en Godot Engine versiones hasta v3.2 y es causado por unas comprobaciones de límites inapropiadas cuando se cargan archivos de imagen .TGA. Dependiendo del contexto de la aplicación, el vec... • https://github.com/godotengine/godot/pull/45701 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

31 May 2019 — In Godot through 3.1, remote code execution is possible due to the deserialization policy not being applied correctly. En Godot hasta la versión 3.1, la ejecución de código remota es posible ya que la política de deserialización no se aplica correctamente. • https://github.com/godotengine/godot/pull/27398 • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

20 Aug 2018 — Godot Engine version All versions prior to 2.1.5, all 3.0 versions prior to 3.0.6. contains a Signed/unsigned comparison, wrong buffer size chackes, integer overflow, missing padding initialization vulnerability in (De)Serialization functions (core/io/marshalls.cpp) that can result in DoS (packet of death), possible leak of uninitialized memory. This attack appear to be exploitable via A malformed packet is received over the network by a Godot application that uses built-in serialization (e.g. game server, ... • https://github.com/zann1x/ITS • CWE-131: Incorrect Calculation of Buffer Size CWE-190: Integer Overflow or Wraparound CWE-681: Incorrect Conversion between Numeric Types CWE-908: Use of Uninitialized Resource CWE-909: Missing Initialization of Resource •