Valve's Game Networking Sockets prior to version v1.2.0 improperly handles long encrypted messages in function AES_GCM_DecryptContext::Decrypt() when compiled using libsodium, leading to a Stack-Based Buffer Overflow and resulting in a memory corruption and possibly even a remote code execution.
References
Link | Resource |
---|---|
https://github.com/ValveSoftware/GameNetworkingSockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3 | Patch Third Party Advisory |
https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets/ | Exploit Third Party Advisory |
https://github.com/ValveSoftware/GameNetworkingSockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3 | Patch Third Party Advisory |
https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ValveSoftware/GameNetworkingSockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3 - Patch, Third Party Advisory | |
References | () https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets/ - Exploit, Third Party Advisory |
Information
Published : 2020-12-02 01:15
Updated : 2024-11-21 05:34
NVD link : CVE-2020-6018
Mitre link : CVE-2020-6018
CVE.ORG link : CVE-2020-6018
JSON object : View
Products Affected
valvesoftware
- game_networking_sockets