An issue was discovered in e6y prboom-plus 2.5.1.5. There is a buffer overflow in client and server code responsible for handling received UDP packets, as demonstrated by ISendPacket or ISendPacketTo in i_network.c.
{ "binaries": [ { "binary_version": "2:2.5.1.5~svn4462+dfsg1-1", "binary_name": "prboom-plus" }, { "binary_version": "2:2.5.1.5~svn4462+dfsg1-1", "binary_name": "prboom-plus-game-server" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-20797.json"
{ "binaries": [ { "binary_version": "2:2.5.1.5+svn4531+dfsg1-1", "binary_name": "prboom-plus" }, { "binary_version": "2:2.5.1.5+svn4531+dfsg1-1", "binary_name": "prboom-plus-game-server" } ] }
{ "binaries": [ { "binary_version": "2:2.5.1.5+svn4540+dfsg1-1build1", "binary_name": "prboom-plus" }, { "binary_version": "2:2.5.1.5+svn4540+dfsg1-1build1", "binary_name": "prboom-plus-game-server" } ] }