
CVE-2021-26825
https://notcve.org/view.php?id=CVE-2021-26825
08 Feb 2021 — An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash. Se presenta un problema de desbo... • https://github.com/godotengine/godot/pull/45702 • CWE-190: Integer Overflow or Wraparound •

CVE-2021-26826
https://notcve.org/view.php?id=CVE-2021-26826
08 Feb 2021 — A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash. Se presenta un problema de desbordamiento de la pila en Godot Engine versiones hasta v3.2 y es causado por unas comprobaciones de límites inapropiadas cuando se cargan archivos de imagen .TGA. Dependiendo del contexto de la aplicación, el vec... • https://github.com/godotengine/godot/pull/45701 • CWE-787: Out-of-bounds Write •

CVE-2019-10069
https://notcve.org/view.php?id=CVE-2019-10069
31 May 2019 — In Godot through 3.1, remote code execution is possible due to the deserialization policy not being applied correctly. En Godot hasta la versión 3.1, la ejecución de código remota es posible ya que la política de deserialización no se aplica correctamente. • https://github.com/godotengine/godot/pull/27398 • CWE-502: Deserialization of Untrusted Data •

CVE-2018-1000224
https://notcve.org/view.php?id=CVE-2018-1000224
20 Aug 2018 — Godot Engine version All versions prior to 2.1.5, all 3.0 versions prior to 3.0.6. contains a Signed/unsigned comparison, wrong buffer size chackes, integer overflow, missing padding initialization vulnerability in (De)Serialization functions (core/io/marshalls.cpp) that can result in DoS (packet of death), possible leak of uninitialized memory. This attack appear to be exploitable via A malformed packet is received over the network by a Godot application that uses built-in serialization (e.g. game server, ... • https://github.com/zann1x/ITS • CWE-131: Incorrect Calculation of Buffer Size CWE-190: Integer Overflow or Wraparound CWE-681: Incorrect Conversion between Numeric Types CWE-908: Use of Uninitialized Resource CWE-909: Missing Initialization of Resource •