CVE-2021-26825

EUVD-2021-13610
An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 70%
Affected Products (NVD)
VendorProductVersion
godotenginegodot_engine
𝑥
≤ 3.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
godot
bookworm
no-dsa
bullseye
no-dsa
buster
no-dsa
sid
3.5.2-stable-2
fixed
trixie
3.5.2-stable-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
godot
bionic
dne
focal
needs-triage
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
dne
xenial
dne