First published: Wed Dec 02 2020(Updated: )
Valve's Game Networking Sockets prior to version v1.2.0 improperly handles long encrypted messages in function AES_GCM_DecryptContext::Decrypt() when compiled using libsodium, leading to a Stack-Based Buffer Overflow and resulting in a memory corruption and possibly even a remote code execution.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Valvesoftware Game Networking Sockets | <1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6018 is a vulnerability in Valve's Game Networking Sockets that can result in a stack-based buffer overflow and possibly remote code execution.
CVE-2020-6018 affects Valve's Game Networking Sockets prior to version 1.2.0 and can lead to memory corruption and a possible remote code execution.
CVE-2020-6018 has a severity rating of critical with a CVSS score of 9.8.
CVE-2020-6018 can be fixed by updating Valve's Game Networking Sockets to version 1.2.0 or later.
You can find more information about CVE-2020-6018 at the following references: [Link 1](https://github.com/ValveSoftware/GameNetworkingSockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3), [Link 2](https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets/).