Files
CVEs-PoC/2021/CVE-2021-26826.md
T
2024-06-18 02:51:15 +02:00

19 lines
833 B
Markdown

### [CVE-2021-26826](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26826)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.
### POC
#### Reference
- https://github.com/godotengine/godot/pull/45701
- https://github.com/godotengine/godot/pull/45701/commits/403e4fd08b0b212e96f53d926e6273e0745eaa5a
#### Github
No PoCs found on GitHub currently.