CVE-2021-26825

Source
https://cve.org/CVERecord?id=CVE-2021-26825
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-26825.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-26825
Downstream
Related
Published
2021-02-08T15:15:12.333Z
Modified
2026-01-31T12:30:37.860115Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::loadimage() function at line: const sizet buffersize = (tgaheader.imagewidth * tgaheader.imageheight) * pixelsize; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

References

Affected packages

Git / github.com/godotengine/godot

Affected ranges

Type
GIT
Repo
https://github.com/godotengine/godot
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*
1.0-stable
1.1-stable
2.*
2.0-stable
3.*
3.0-stable
3.1-stable
3.2-stable

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-26825.json"