Skip to content

sprushed/CVE-2022-30292

main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 

CVE-2022-30292

Description

This vulnerability is the heap-based buffer overflow in the function thread_call in Squirrel 3.2 and below. It caused by the lack of the call of sq_reservestack function. This vulnerability leads to DoS of the client and could possibly lead to sandbox escape and arbitrary code execution

Attack vector

To exploit vulnerability someone must run crafted Squirrel bytecode or source file. This can be accomplished in multiple ways. For example, a server sends the game map to the client and one executes the malicious Squirrel script. The another way of being attacked is installing a malicious game mod onto your server.

Fix

There is the fix commit for this vulnerability. To apply the fix you should recompile the project from sources since this commit.

Affected applications

There are lots of games which use Squirrel as a main scripting language. Developers of these games must apply the fix as soon as possible.

Proof of concept

We will not provide the PoC before 90 days from the date the fix was published. Perhaps we will provide it later.

Credits

  • Pavel Blinnikov (pturtle)
  • Ilya Titov (KyberGnida)
  • Andrey Chizhov (thsage)
  • Alexander Zhdanov (hydrag)

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published