buffer overflows in prboom-plus-game-server that can be triggered remotely
Bug #1878958 reported by
Michał
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
prboom-plus (Ubuntu) |
New
|
Undecided
|
Unassigned |
Bug Description
Prboom-plus is vulnerable to buffer overflow in both client and server side that can be triggered remotely. I confirmed on Ubuntu 18.04:
prboom-plus:
Installed: 2:2.5.1.
Candidate: 2:2.5.1.
Version table:
*** 2:2.5.1.
500 http://
100 /var/lib/
Initially it was submitted here:
- https:/
- https:/
If you can assigne a CVE, please credit me as: Michał Dardas from LogicalTrust
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res