
CVE-2021-43518
https://notcve.org/view.php?id=CVE-2021-43518
15 Dec 2021 — Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution. Teeworlds versiones hasta 0.7.5 incluyéndola, es vulnerable a un desbordamiento del búfer. Un analizador de mapas no comprueba el valor m_Channels procedente de un archivo de mapas, conllevando a un desborda... • https://github.com/teeworlds/teeworlds/issues/2981 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2019-20787
https://notcve.org/view.php?id=CVE-2019-20787
22 Apr 2020 — Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size. Teeworlds versiones anteriores a la versión 0.7.4, tiene un desbordamiento de enteros al calcular un tamaño de tilemap. • http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00044.html • CWE-190: Integer Overflow or Wraparound •

CVE-2018-18541 – Debian Security Advisory 4329-1
https://notcve.org/view.php?id=CVE-2018-18541
20 Oct 2018 — In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets. En Teeworlds en versiones anteriores a la 0.6.5, podrían falsificarse paquetes de conexión. No ha habido un desafío-respuesta involucrado en el build up de conexión. • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00046.html • CWE-20: Improper Input Validation •

CVE-2016-9400 – Gentoo Linux Security Advisory 201705-13
https://notcve.org/view.php?id=CVE-2016-9400
22 Feb 2017 — The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling. El método CClient::ProcessServerPacket en engine/client/client.cpp en Teeworlds en versiones anteriores a 0.6.4 permite a servidores remotos escribir en ubicaciones de memoria física arbitrarias y posiblemente ejecutar código arbitrario a través de vectores que involucran ma... • http://www.openwall.com/lists/oss-security/2016/11/16/8 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •