CVE-2011-3341
https://notcve.org/view.php?id=CVE-2011-3341
Multiple off-by-one errors in order_cmd.cpp in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted CMD_INSERT_ORDER command. Múltiples errores off-by-one en order_cmd.cpp en OpenTTD antes de v1.1.3, permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección a través de un comando CMD_INSERT_ORDER • http://bugs.openttd.org/task/4745 http://bugs.openttd.org/task/4745/getfile/7707/fixcmds.diff http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html http://openwall.com/lists/oss-security/2011/09/02/4 http://openwall.com/lists/oss-security/2011/09/06/2 http://secunia.com/advisories/46075 http://security.openttd.org/en/CVE-2011-3341 http://www.debian.org/security/2012/dsa-2386 http://www.securityfocus.com/bid/49439 • CWE-189: Numeric Errors •
CVE-2011-3343
https://notcve.org/view.php?id=CVE-2011-3343
Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file. Múltiples desbordamientos de buffer en OpenTTD antes de v1.1.3, permite a usuarios locales provocar una denegación de servicio (caída del demonio) o posiblemente ganar privilegios a través de (1) un archivo BMP modificado con compresión RLE o (2) un archivo BMP con dimensiones modificadas. • http://bugs.openttd.org/task/4746 http://bugs.openttd.org/task/4747 http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html http://openwall.com/lists/oss-security/2011/09/02/4 http://openwall.com/lists/oss-security/2011/09/06/2 http://secunia.com/advisories/46075 http://security.openttd.org/en/CVE-2011-3343 http://www.debian.org/security/2012/dsa-2386 http://www.securityfocus.com/bid/49439 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-4168
https://notcve.org/view.php?id=CVE-2010-4168
Multiple use-after-free vulnerabilities in OpenTTD 1.0.x before 1.0.5 allow (1) remote attackers to cause a denial of service (invalid write and daemon crash) by abruptly disconnecting during transmission of the map from the server, related to network/network_server.cpp; (2) remote attackers to cause a denial of service (invalid read and daemon crash) by abruptly disconnecting, related to network/network_server.cpp; and (3) remote servers to cause a denial of service (invalid read and application crash) by forcing a disconnection during the join process, related to network/network.cpp. Múltiples vulnerabilidades de liberación después del uso en OpenTTD v1.0.x anterior a v1.0.5 permite (1) que atacantes remotos provoquen una denegación de servicio (escritura no válida y caída de demonio) desconectando repentinamente durante la transmisión del plano del servidor, relacionado con network/network_server.cpp; (2) permite a atacantes remotos provocar una denegación de servicio (lectura no válida y caída de demonio) desconectando repentinamente durante la transmisión del plano del servidor, relacionado con network/network_server.cpp; (3) servidores remotos pueden provocar una denegación de servicio (lectura no válida y caída de aplicación) forzando una desconexión durante el proceso de unión, relacionado con network/network.cpp. • http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052187.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052193.html http://marc.info/?l=oss-security&m=128975491407670&w=2 http://marc.info/?l=oss-security&m=128984298802678&w=2 http://secunia.com/advisories/42578 http://security.openttd.org/en/CVE-2010-4168 http://security.openttd.org/en/patch/28.patch http://vcs.openttd.org/svn/changeset/21182 http://www.securityfocus.com/bid/ • CWE-416: Use After Free •
CVE-2010-2534
https://notcve.org/view.php?id=CVE-2010-2534
The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue. La función NetworkSyncCommandQueue en network/network_command.cpp en OpenTTD anterior a v1.0.3 no limpia de forma adecuada un puntero en una lista enlazada, lo que permite a atacantes remotos provocar una denegación de servicio (bucle infinito y consumo de CPU) a través de una petición manipulada, relativo a la cola de comandos del cliente. • http://bugs.openttd.org/task/3909 http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html http://osvdb.org/66503 http://secunia.com/advisories/40630 http://secunia.com/advisories/40760 http://security.openttd.org/en/CVE-2010-2534 http://www.openwall.com/lists/oss-security/2010/07/20/1 http://www.securityfocus • CWE-399: Resource Management Errors •
CVE-2010-0401
https://notcve.org/view.php?id=CVE-2010-0401
OpenTTD before 1.0.1 accepts a company password for authentication in response to a request for the server password, which allows remote authenticated users to bypass intended access restrictions or cause a denial of service (daemon crash) by sending a company password packet. Versiones de OpenTTD anteriores a v1.0.1 aceptan una contraseña corporativa para autenticación en respuesta a una petición a la contraseña del servidor, permite a usuarios autenticados remotamente evitar restricciones de acceso establecidas o causar una denegación de servicio (caída del demonio) enviando un paquete de contraseña corporativa. • http://bugs.openttd.org/task/3754 http://secunia.com/advisories/39669 http://security.openttd.org/en/CVE-2010-0401 • CWE-264: Permissions, Privileges, and Access Controls •