First published: Mon Jun 22 2020(Updated: )
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Chocolate-doom Chocolate Doom | =3.0.0 | |
Chocolate-doom Crispy Doom | =5.8.0 | |
Opensuse Backports | =sle-15-sp1 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14983 is a vulnerability in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 that allows a malicious user to perform a buffer overflow by exploiting the server's failure to validate the user-controlled num_players value.
CVE-2020-14983 has a severity rating of 9.8, which is considered critical.
Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 are affected by CVE-2020-14983.
A malicious user can exploit CVE-2020-14983 by manipulating the num_players value, leading to a buffer overflow and potential stack manipulation.
It is recommended to update to the latest versions of Chocolate Doom and Crispy Doom, as they contain fixes for CVE-2020-14983.