Godot Engine version All versions prior to 2.1.5, all 3.0 versions prior to 3.0.6. contains a Signed/unsigned comparison, wrong buffer size chackes, integer overflow, missing padding initialization vulnerability in (De)Serialization functions (core/io/marshalls.cpp) that can result in DoS (packet of death), possible leak of uninitialized memory. This attack appear to be exploitable via A malformed packet is received over the network by a Godot application that uses built-in serialization (e.g. game server, or game client). Could be triggered by multiplayer opponent. This vulnerability appears to have been fixed in 2.1.5, 3.0.6, master branch after commit feaf03421dda0213382b51aff07bd5a96b29487b.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-08-20T20:00:00Z
Updated: 2024-09-17T02:37:16.821Z
Reserved: 2018-08-20T00:00:00Z
Link: CVE-2018-1000224
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-08-20T20:29:01.597
Modified: 2024-11-21T03:39:58.327
Link: CVE-2018-1000224
Redhat
No data.