Vulnerability CVE-2018-18541


Published: 2018-10-20   Modified: 2018-10-21

Description:
In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Teeworlds -> Teeworlds 
Debian -> Debian linux 

 References:
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00046.html
https://bugs.debian.org/911487
https://github.com/teeworlds/teeworlds/issues/1536
https://teeworlds.com/?page=news&id=12544
https://www.debian.org/security/2018/dsa-4329

Copyright 2024, cxsecurity.com

 

Back to Top