openSUSE Security Update : teeworlds (openSUSE-2019-1793)

critical Nessus Plugin ID 126977

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for teeworlds fixes the following issues :

- CVE-2019-10879: An integer overflow in CDataFileReader::Open() could have lead to a buffer overflow and possibly remote code execution, because size-related multiplications were mishandled.
(boo#1131729)

- CVE-2019-10878: A failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions could have lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution.

- CVE-2019-10877: An integer overflow in CMap::Load() could have lead to a buffer overflow, because multiplication of width and height were mishandled.

- CVE-2018-18541: Connection packets could have been forged. There was no challenge-response involved in the connection build up. A remote attacker could have sent connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets. (boo#1112910)

- Update to version 0.7.3.1

- Colorful gametype and level icons in the browser instead of grayscale.

- Add an option to use raw mouse inputs, revert to (0.6) relative mode by default.

- Demo list marker indicator.

- Restore ingame Player and Tee menus, add a warning that a reconnect is needed.

- Emotes can now be cancelled by releasing the mouse in the middle of the circle.

- Improve add friend text.

- Add a confirmation for removing a filter

- Add a 'click a player to follow' hint

- Also hint players which key they should press to set themselves ready.

- fixed using correct array measurements when placing egg doodads

- fixed demo recorder downloaded maps using the sha256 hash

- show correct game release version in the start menu and console

- Fix platform-specific client libraries for Linux

- advanced scoreboard with game statistics

- joystick support (experimental!)

- copy paste (one-way)

- bot cosmetics (a visual difference between players and NPCs)

- chat commands (type / in chat)

- players can change skin without leaving the server (again)

- live automapper and complete rules for 0.7 tilesets

- audio toggling HUD

- an Easter surprise...

- new gametypes: 'last man standing' (LMS) and 'last team standing' (LTS). survive by your own or as a team with limited weaponry

- 64 players support. official gametypes are still restricted to 16 players maximum but allow more spectators

- new skin system. build your own skins based on a variety of provided parts

- enhanced security. all communications require a handshake and use a token to counter spoofing and reflection attacks

- new maps: ctf8, dm3, lms1. Click to discover them!

- animated background menu map: jungle, heavens (day/night themes, customisable in the map editor)

- new design for the menus: added start menus, reworked server browser, settings

- customisable gametype icons (browser). make your own!

- chat overhaul, whispers (private messages)

- composed binds (ctrl+, shift+, alt+)

- scoreboard remodelled, now shows kills/deaths

- demo markers

- master server list cache (in case the masters are unreachable)

- input separated from rendering (optimisation)

- upgrade to SDL2. support for multiple monitors, non-english keyboards, and more

- broadcasts overhaul, optional colours support

- ready system, for competitive settings

- server difficulty setting (casual, competitive, normal), shown in the browser

- spectator mode improvements: follow flags, click on players

- bot flags for modified servers: indicate NPCs, can be filtered out in the server browser

- sharper graphics all around (no more tileset_borderfix and dilate)

- refreshed the HUD, ninja cooldown, new mouse cursor

- mapres update (higher resolution, fixes...)

Solution

Update the affected teeworlds packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1112910

https://bugzilla.opensuse.org/show_bug.cgi?id=1131729

Plugin Details

Severity: Critical

ID: 126977

File Name: openSUSE-2019-1793.nasl

Version: 1.3

Type: local

Agent: unix

Published: 7/24/2019

Updated: 5/8/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-10879

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:teeworlds-debugsource, p-cpe:/a:novell:opensuse:teeworlds, cpe:/o:novell:opensuse:15.1, p-cpe:/a:novell:opensuse:teeworlds-debuginfo

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/23/2019

Vulnerability Publication Date: 10/20/2018

Reference Information

CVE: CVE-2018-18541, CVE-2019-10877, CVE-2019-10878, CVE-2019-10879