Lucene search

K
archlinuxArchLinuxASA-202103-26
HistoryMar 25, 2021 - 12:00 a.m.

[ASA-202103-26] godot: arbitrary code execution

2021-03-2500:00:00
security.archlinux.org
172
code execution
godot
integer overflow
stack overflow
tga image
arch linux
cve-2021-26825
cve-2021-26826
remote attack
security advisory

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

62.1%

Arch Linux Security Advisory ASA-202103-26

Severity: Medium
Date : 2021-03-25
CVE-ID : CVE-2021-26825 CVE-2021-26826
Package : godot
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1544

Summary

The package godot before version 3.2.3-2 is vulnerable to arbitrary
code execution.

Resolution

Upgrade to 3.2.3-2.

pacman -Syu “godot>=3.2.3-2”

The problems have been fixed upstream but no release is available yet.

Workaround

None.

Description

  • CVE-2021-26825 (arbitrary code execution)

An integer overflow issue exists in Godot Engine version 3.2.3 that can
be triggered when loading specially crafted TGA image files. The
vulnerability exists in the ImageLoaderTGA::load_image() function in
the line “const size_t buffer_size = (tga_header.image_width *
tga_header.image_height) * pixel_size;” The bug leads to a dynamic
stack buffer overflow. Depending on the context of the application, the
attack vector can be local or remote, and can lead to code execution
and/or a system crash.

  • CVE-2021-26826 (arbitrary code execution)

A stack overflow issue exists in Godot Engine version 3.2.3 and is
caused by improper boundary checks when loading TGA image files.
Depending on the context of the application, the attack vector can be
local or remote, and can lead to code execution and/or a system crash.

Impact

A remote attacker who is able to supply a crafted TGA file to a client
which subsequently gets loaded by the engine is able to execute
arbitrary code on the affected host.

References

https://bugs.archlinux.org/task/70057
https://github.com/godotengine/godot/pull/45702
https://github.com/godotengine/godot/commit/113b5ab1c45c01b8e6d54d13ac8876d091f883a8
https://security.archlinux.org/CVE-2021-26825
https://security.archlinux.org/CVE-2021-26826

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanygodot< 3.2.3-2UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

62.1%