CVE-2018-1000224
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Godot Engine version All versions prior to 2.1.5, all 3.0 versions prior to 3.0.6. contains a Signed/unsigned comparison, wrong buffer size chackes, integer overflow, missing padding initialization vulnerability in (De)Serialization functions (core/io/marshalls.cpp) that can result in DoS (packet of death), possible leak of uninitialized memory. This attack appear to be exploitable via A malformed packet is received over the network by a Godot application that uses built-in serialization (e.g. game server, or game client). Could be triggered by multiplayer opponent. This vulnerability appears to have been fixed in 2.1.5, 3.0.6, master branch after commit feaf03421dda0213382b51aff07bd5a96b29487b.
Godot Engine en todas las versiones anteriores a la 2.1.5 y todas las versiones 3.0 anteriores a la 3.0.6 contiene una vulnerabilidad de comparación Signed/unsigned, comprobaciones erróneas de tamaños de búfer, desbordamiento de enteros y de ausencia de inicialización de relleno (padding) en las funciones (De)Serialization (core/io/marshalls.cpp) que puede resultar en una denegación de servicio (paquete de la muerte) y una posible fuga de memoria no inicializada. Este ataque parece ser explotable si se recibe un paquete mal firmado en la red por una aplicación Godot que utiliza la serialización incorporada (p.ej. game server o game client). Un oponenete en modo multijugador puede desencadenarlo. La vulnerabilidad parece haber sido solucionada en la versión 2.1.5 y en la 3.0.6 master branch tras el commit con ID feaf03421dda0213382b51aff07bd5a96b29487b.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-08-20 CVE Reserved
- 2018-08-20 CVE Published
- 2021-12-07 First Exploit
- 2024-09-17 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-131: Incorrect Calculation of Buffer Size
- CWE-190: Integer Overflow or Wraparound
- CWE-681: Incorrect Conversion between Numeric Types
- CWE-908: Use of Uninitialized Resource
- CWE-909: Missing Initialization of Resource
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/zann1x/ITS | 2021-12-07 | |
https://github.com/godotengine/godot/issues/20558 | 2024-09-17 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://godotengine.org/article/maintenance-release-godot-2-1-5 | 2020-08-24 | |
https://godotengine.org/article/maintenance-release-godot-3-0-6 | 2020-08-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Godotengine Search vendor "Godotengine" | Godot Search vendor "Godotengine" for product "Godot" | < 2.1.5 Search vendor "Godotengine" for product "Godot" and version " < 2.1.5" | - |
Affected
| ||||||
Godotengine Search vendor "Godotengine" | Godot Search vendor "Godotengine" for product "Godot" | >= 3.0.0 < 3.0.6 Search vendor "Godotengine" for product "Godot" and version " >= 3.0.0 < 3.0.6" | - |
Affected
|