{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14308","assignerOrgId":"1a37b84a-8e51-4525-b3d6-87e2fae01dbd","state":"PUBLISHED","assignerShortName":"GovTech CSG","dateReserved":"2025-12-09T07:38:25.483Z","datePublished":"2025-12-09T07:44:34.003Z","dateUpdated":"2025-12-09T14:39:50.288Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://robocode.sourceforge.io","defaultStatus":"unaffected","modules":["Buffer Write Method"],"packageName":"robocode","platforms":["Windows","MacOS","Linux"],"product":"Robocode","programFiles":["src/main/java/net/sf/robocode/io/Buffer.java"],"programRoutines":[{"name":"write"}],"repo":"https://github.com/robo-code/robocode","vendor":"Robocode Project","versions":[{"status":"affected","version":"1.9.3.6","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"titancaproject@gmail.com"}],"datePublic":"2025-05-10T14:33:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An integer overflow vulnerability exists in the <code>write</code> method of the <code>Buffer</code> class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution.\n\n<p></p>"}],"value":"An integer overflow vulnerability exists in the write method of the Buffer class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution."}],"impacts":[{"capecId":"CAPEC-128","descriptions":[{"lang":"en","value":"CAPEC-128 Integer Attacks"}]},{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100 Overflow Buffers"}]}],"metrics":[{"cvssV4_0":{"Automatable":"YES","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":10,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"RED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"DIFFUSE","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:U/V:D/RE:M/U:Red","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-190","description":"CWE-190 Integer Overflow or Wraparound","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"1a37b84a-8e51-4525-b3d6-87e2fae01dbd","shortName":"GovTech CSG","dateUpdated":"2025-12-09T07:44:34.003Z"},"references":[{"url":"https://github.com/robo-code/robocode/pull/70"}],"source":{"discovery":"UNKNOWN"},"tags":["x_integer_overflow","x_buffer_overflow","x_security_vulnerability"],"title":"Integer Overflow in Robocode's Buffer Write Method","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-09T14:39:41.827521Z","id":"CVE-2025-14308","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-09T14:39:50.288Z"}}]}}