CVE-2018-18541

Priority
Description
In Teeworlds before 0.6.5, connection packets could be forged. There was no
challenge-response involved in the connection build up. A remote attacker
could send connection packets from a spoofed IP address and occupy all
server slots, or even use them for a reflection attack using map download
packets.
Notes
Package
Upstream:released (0.7.0-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.04 (Disco Dingo):not-affected (0.7.0-1)
Ubuntu 19.10 (Eoan):not-affected (0.7.0-1)
More Information

Updated: 2019-10-09 06:46:48 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)