heap buffer overflow in freedroidrpg saved game
Bug #1878965 reported by
Michał
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
FreedroidRPG |
Confirmed
|
Unknown
|
|||
freedroidrpg (Ubuntu) |
New
|
Undecided
|
Unassigned |
Bug Description
This issue assumes that users may load malicious save games, for example downloaded or
received from other users. While loading a save game, heap buffer overflow occurs because the application uses fixed size buffers which can be overrun if save game file contains more than
4096 characters between "beginning_of_map" and '\n' or between '' and '\n'.
It was initially submitted to: https:/
If you can assigne a CVE, please credit me as: Michał Dardas from LogicalTrust
Changed in freedroid: | |
status: | Unknown → New |
Changed in freedroid: | |
status: | New → Confirmed |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res