Integer Overflow or Wraparound Affecting godot package, versions <3.5.1-stable-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-GODOT-1070653
  • published9 Feb 2021
  • disclosed8 Feb 2021

Introduced: 8 Feb 2021

CVE-2021-26825  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Debian:unstable godot to version 3.5.1-stable-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream godot package and not the godot package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

CVSS Scores

version 3.1