A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.
References
Link | Resource |
---|---|
https://github.com/godotengine/godot/pull/45701 | Patch Third Party Advisory |
https://github.com/godotengine/godot/pull/45701/commits/403e4fd08b0b212e96f53d926e6273e0745eaa5a | Patch Third Party Advisory |
https://github.com/godotengine/godot/pull/45701 | Patch Third Party Advisory |
https://github.com/godotengine/godot/pull/45701/commits/403e4fd08b0b212e96f53d926e6273e0745eaa5a | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/godotengine/godot/pull/45701 - Patch, Third Party Advisory | |
References | () https://github.com/godotengine/godot/pull/45701/commits/403e4fd08b0b212e96f53d926e6273e0745eaa5a - Patch, Third Party Advisory |
Information
Published : 2021-02-08 15:15
Updated : 2024-11-21 05:56
NVD link : CVE-2021-26826
Mitre link : CVE-2021-26826
CVE.ORG link : CVE-2021-26826
JSON object : View
Products Affected
godotengine
- godot_engine
CWE
CWE-787
Out-of-bounds Write