CVE-2026-33250 (GCVE-0-2026-33250)

Vulnerability from cvelistv5 – Published: 2026-03-23 23:38 – Updated: 2026-03-24 13:36
VLAI?
Title
Crash when receiving specially-crafted packets
Summary
Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious server can use this to crash the game on the player's machine. Authentication is not needed and, by default, logs do not contain any useful information. All users should upgrade to Freeciv21 version 3.1.1. Running the server behind a firewall can help mitigate the issue for non-public servers. For local games, Freeciv21 restricts connections to the current user and is therefore not affected.
CWE
  • CWE-20 - Improper Input Validation
  • CWE-121 - Stack-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
longturn freeciv21 Affected: < 3.1.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-33250",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-24T13:36:15.835264Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-24T13:36:23.980Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "freeciv21",
          "vendor": "longturn",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 3.1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious server can use this to crash the game on the player\u0027s machine. Authentication is not needed and, by default, logs do not contain any useful information. All users should upgrade to Freeciv21 version 3.1.1. Running the server behind a firewall can help mitigate the issue for non-public servers. For local games, Freeciv21 restricts connections to the current user and is therefore not affected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121: Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-23T23:38:02.070Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/longturn/freeciv21/security/advisories/GHSA-f76g-6w3f-f6r3",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/longturn/freeciv21/security/advisories/GHSA-f76g-6w3f-f6r3"
        },
        {
          "name": "https://github.com/longturn/freeciv21/commit/ad8e18ca22595529599782b2984bf44df8d69ed6",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/longturn/freeciv21/commit/ad8e18ca22595529599782b2984bf44df8d69ed6"
        },
        {
          "name": "https://github.com/longturn/freeciv21/releases/tag/v3.1.1",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/longturn/freeciv21/releases/tag/v3.1.1"
        },
        {
          "name": "https://redmine.freeciv.org/issues/1955",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://redmine.freeciv.org/issues/1955"
        }
      ],
      "source": {
        "advisory": "GHSA-f76g-6w3f-f6r3",
        "discovery": "UNKNOWN"
      },
      "title": "Crash when receiving specially-crafted packets"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2026-33250",
    "datePublished": "2026-03-23T23:38:02.070Z",
    "dateReserved": "2026-03-18T02:42:27.509Z",
    "dateUpdated": "2026-03-24T13:36:23.980Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-33250",
      "date": "2026-04-14",
      "epss": "0.00229",
      "percentile": "0.45687"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-33250\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-03-24T00:16:29.830\",\"lastModified\":\"2026-03-24T15:53:48.067\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious server can use this to crash the game on the player\u0027s machine. Authentication is not needed and, by default, logs do not contain any useful information. All users should upgrade to Freeciv21 version 3.1.1. Running the server behind a firewall can help mitigate the issue for non-public servers. For local games, Freeciv21 restricts connections to the current user and is therefore not affected.\"},{\"lang\":\"es\",\"value\":\"Freeciv21 es un juego de estrategia gratuito de c\u00f3digo abierto, por turnos, de construcci\u00f3n de imperios. Las versiones anteriores a la 3.1.1 fallan con un desbordamiento de pila al recibir paquetes especialmente dise\u00f1ados. Un atacante remoto puede usar esto para derribar cualquier servidor p\u00fablico. Un servidor malicioso puede usar esto para bloquear el juego en la m\u00e1quina del jugador. No se necesita autenticaci\u00f3n y, por defecto, los registros no contienen ninguna informaci\u00f3n \u00fatil. Todos los usuarios deber\u00edan actualizar a la versi\u00f3n 3.1.1 de Freeciv21. Ejecutar el servidor detr\u00e1s de un cortafuegos puede ayudar a mitigar el problema para servidores no p\u00fablicos. Para juegos locales, Freeciv21 restringe las conexiones al usuario actual y por lo tanto no se ve afectado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-121\"}]}],\"references\":[{\"url\":\"https://github.com/longturn/freeciv21/commit/ad8e18ca22595529599782b2984bf44df8d69ed6\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/longturn/freeciv21/releases/tag/v3.1.1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/longturn/freeciv21/security/advisories/GHSA-f76g-6w3f-f6r3\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://redmine.freeciv.org/issues/1955\",\"source\":\"security-advisories@github.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-33250\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-24T13:36:15.835264Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-24T13:36:18.996Z\"}}], \"cna\": {\"title\": \"Crash when receiving specially-crafted packets\", \"source\": {\"advisory\": \"GHSA-f76g-6w3f-f6r3\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"longturn\", \"product\": \"freeciv21\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 3.1.1\"}]}], \"references\": [{\"url\": \"https://github.com/longturn/freeciv21/security/advisories/GHSA-f76g-6w3f-f6r3\", \"name\": \"https://github.com/longturn/freeciv21/security/advisories/GHSA-f76g-6w3f-f6r3\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/longturn/freeciv21/commit/ad8e18ca22595529599782b2984bf44df8d69ed6\", \"name\": \"https://github.com/longturn/freeciv21/commit/ad8e18ca22595529599782b2984bf44df8d69ed6\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/longturn/freeciv21/releases/tag/v3.1.1\", \"name\": \"https://github.com/longturn/freeciv21/releases/tag/v3.1.1\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://redmine.freeciv.org/issues/1955\", \"name\": \"https://redmine.freeciv.org/issues/1955\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious server can use this to crash the game on the player\u0027s machine. Authentication is not needed and, by default, logs do not contain any useful information. All users should upgrade to Freeciv21 version 3.1.1. Running the server behind a firewall can help mitigate the issue for non-public servers. For local games, Freeciv21 restricts connections to the current user and is therefore not affected.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20: Improper Input Validation\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"CWE-121: Stack-based Buffer Overflow\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-03-23T23:38:02.070Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-33250\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-24T13:36:23.980Z\", \"dateReserved\": \"2026-03-18T02:42:27.509Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-03-23T23:38:02.070Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…