CVE-2021-26825

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-26825
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-26825.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-26825
Downstream
Related
Published
2021-02-08T15:15:12Z
Modified
2025-10-21T06:04:39.665551Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::loadimage() function at line: const sizet buffersize = (tgaheader.imagewidth * tgaheader.imageheight) * pixelsize; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

References

Affected packages

Git / github.com/godotengine/godot

Affected ranges

Type
GIT
Repo
https://github.com/godotengine/godot
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.0-stable
1.1-stable

2.*

2.0-stable

3.*

3.0-stable
3.1-stable
3.2-stable