First published: Wed Feb 22 2017(Updated: )
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Teeworlds | <0.6.4 | |
Fedora | =23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9400 has a high severity rating due to its potential to allow remote code execution.
To fix CVE-2016-9400, update Teeworlds to version 0.6.4 or later.
All versions of Teeworlds before 0.6.4 are affected by CVE-2016-9400.
CVE-2016-9400 could allow an attacker to write to arbitrary physical memory locations, leading to possible arbitrary code execution.
Yes, Fedora 23 is specifically mentioned as affected by CVE-2016-9400.