CVE-2016-9400

Published: 22 February 2017

The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
teeworlds
Launchpad, Ubuntu, Debian
Upstream
Released (0.6.4+dfsg-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(0.6.4+dfsg-1)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(0.6.4+dfsg-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(0.6.4+dfsg-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(0.6.4+dfsg-1)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)
Patches:
Upstream: https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62