CVE-2020-14983

HIGH

Description

The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.

References

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00012.html

https://github.com/chocolate-doom/chocolate-doom/issues/1293

Details

Source: MITRE

Published: 2020-06-22

Updated: 2020-07-08

Type: CWE-120

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
145349FreeBSD : chocolate-doom -- Arbitrary code execution (35aef72c-5c8e-11eb-8309-4ccc6adda413)NessusFreeBSD Local Security Checks
high
138729openSUSE Security Update : chocolate-doom (openSUSE-2020-939)NessusSuSE Local Security Checks
high
138723openSUSE Security Update : chocolate-doom (openSUSE-2020-928)NessusSuSE Local Security Checks
high