{"id":"CVE-2020-14983","details":"The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.","modified":"2026-04-16T04:39:51.902069781Z","published":"2020-06-22T20:15:11.380Z","related":["openSUSE-SU-2020:0928-1","openSUSE-SU-2020:0939-1","openSUSE-SU-2020:0947-1","openSUSE-SU-2024:10680-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00007.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00012.html"},{"type":"FIX","url":"https://github.com/chocolate-doom/chocolate-doom/issues/1293"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/chocolate-doom/chocolate-doom","events":[{"introduced":"0"},{"last_affected":"8777b99cf72daed3cae0aa0a0ee730dc6610de2d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0.0-NA"}]}},{"type":"GIT","repo":"https://github.com/fabiangreffrath/crispy-doom","events":[{"introduced":"0"},{"last_affected":"a87c2f73392099179c88143c0bc2d019fb456cdd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.8.0"}]}}],"versions":["chocolate-doom-0.0.1","chocolate-doom-0.0.2","chocolate-doom-0.0.3","chocolate-doom-0.0.4","chocolate-doom-0.1.0","chocolate-doom-0.1.1","chocolate-doom-0.1.2","chocolate-doom-1.0.0","chocolate-doom-1.1.0","chocolate-doom-1.1.1","chocolate-doom-2.0.0","chocolate-doom-2.0.0-beta1","chocolate-doom-2.0.0-beta2","chocolate-doom-2.0.0-beta3","chocolate-doom-2.1.0","chocolate-doom-3.0.0","chocolate-doom-3.0.0-beta1","chocolate-strife-beta1","chocolate-strife-beta2","crispy-doom-1.0","crispy-doom-1.1","crispy-doom-1.1-beta1","crispy-doom-1.1-beta2","crispy-doom-1.2","crispy-doom-1.3","crispy-doom-1.3-beta1","crispy-doom-1.4","crispy-doom-1.5","crispy-doom-2.0","crispy-doom-2.1","crispy-doom-2.2","crispy-doom-2.3","crispy-doom-3.0","crispy-doom-3.1","crispy-doom-3.2","crispy-doom-3.3","crispy-doom-3.4","crispy-doom-3.5","crispy-doom-4.0","crispy-doom-4.1","crispy-doom-4.2","crispy-doom-4.3","crispy-doom-5.0","crispy-doom-5.1","crispy-doom-5.2","crispy-doom-5.3","crispy-doom-5.4","crispy-doom-5.5","crispy-doom-5.5.1","crispy-doom-5.5.2","crispy-doom-5.6","crispy-doom-5.6.1","crispy-doom-5.6.2","crispy-doom-5.6.3","crispy-doom-5.6.4","crispy-doom-5.7","crispy-doom-5.7.1","crispy-doom-5.7.2","crispy-doom-5.8.0","doom-src-release","netalpha1","netalpha2","netalpha3","netalpha4","netalpha5","raven-src-release"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-14983.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"sle-15-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}