In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets. Upstream issue: https://github.com/teeworlds/teeworlds/issues/1536 References: https://teeworlds.com/?page=news&id=12544
Created teeworlds tracking bugs for this issue: Affects: epel-7 [bug 1641644] Affects: fedora-all [bug 1641643]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.