// For flags

CVE-2018-1000224

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Godot Engine version All versions prior to 2.1.5, all 3.0 versions prior to 3.0.6. contains a Signed/unsigned comparison, wrong buffer size chackes, integer overflow, missing padding initialization vulnerability in (De)Serialization functions (core/io/marshalls.cpp) that can result in DoS (packet of death), possible leak of uninitialized memory. This attack appear to be exploitable via A malformed packet is received over the network by a Godot application that uses built-in serialization (e.g. game server, or game client). Could be triggered by multiplayer opponent. This vulnerability appears to have been fixed in 2.1.5, 3.0.6, master branch after commit feaf03421dda0213382b51aff07bd5a96b29487b.

Godot Engine en todas las versiones anteriores a la 2.1.5 y todas las versiones 3.0 anteriores a la 3.0.6 contiene una vulnerabilidad de comparación Signed/unsigned, comprobaciones erróneas de tamaños de búfer, desbordamiento de enteros y de ausencia de inicialización de relleno (padding) en las funciones (De)Serialization (core/io/marshalls.cpp) que puede resultar en una denegación de servicio (paquete de la muerte) y una posible fuga de memoria no inicializada. Este ataque parece ser explotable si se recibe un paquete mal firmado en la red por una aplicación Godot que utiliza la serialización incorporada (p.ej. game server o game client). Un oponenete en modo multijugador puede desencadenarlo. La vulnerabilidad parece haber sido solucionada en la versión 2.1.5 y en la 3.0.6 master branch tras el commit con ID feaf03421dda0213382b51aff07bd5a96b29487b.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-08-20 CVE Reserved
  • 2018-08-20 CVE Published
  • 2021-12-07 First Exploit
  • 2024-09-17 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-131: Incorrect Calculation of Buffer Size
  • CWE-190: Integer Overflow or Wraparound
  • CWE-681: Incorrect Conversion between Numeric Types
  • CWE-908: Use of Uninitialized Resource
  • CWE-909: Missing Initialization of Resource
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Godotengine
Search vendor "Godotengine"
Godot
Search vendor "Godotengine" for product "Godot"
< 2.1.5
Search vendor "Godotengine" for product "Godot" and version " < 2.1.5"
-
Affected
Godotengine
Search vendor "Godotengine"
Godot
Search vendor "Godotengine" for product "Godot"
>= 3.0.0 < 3.0.6
Search vendor "Godotengine" for product "Godot" and version " >= 3.0.0 < 3.0.6"
-
Affected