The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00012.html
https://github.com/chocolate-doom/chocolate-doom/issues/1293
Source: MITRE
Published: 2020-06-22
Updated: 2020-07-08
Type: CWE-120
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
145349 | FreeBSD : chocolate-doom -- Arbitrary code execution (35aef72c-5c8e-11eb-8309-4ccc6adda413) | Nessus | FreeBSD Local Security Checks | high |
138729 | openSUSE Security Update : chocolate-doom (openSUSE-2020-939) | Nessus | SuSE Local Security Checks | high |
138723 | openSUSE Security Update : chocolate-doom (openSUSE-2020-928) | Nessus | SuSE Local Security Checks | high |