Page 2 of 15 results (0.005 seconds)

CVSS: 5.0EPSS: 9%CPEs: 87EXPL: 0

The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue. La función NetworkSyncCommandQueue en network/network_command.cpp en OpenTTD anterior a v1.0.3 no limpia de forma adecuada un puntero en una lista enlazada, lo que permite a atacantes remotos provocar una denegación de servicio (bucle infinito y consumo de CPU) a través de una petición manipulada, relativo a la cola de comandos del cliente. • http://bugs.openttd.org/task/3909 http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html http://osvdb.org/66503 http://secunia.com/advisories/40630 http://secunia.com/advisories/40760 http://security.openttd.org/en/CVE-2010-2534 http://www.openwall.com/lists/oss-security/2010/07/20/1 http://www.securityfocus • CWE-399: Resource Management Errors •

CVSS: 6.5EPSS: 0%CPEs: 52EXPL: 0

OpenTTD before 1.0.1 accepts a company password for authentication in response to a request for the server password, which allows remote authenticated users to bypass intended access restrictions or cause a denial of service (daemon crash) by sending a company password packet. Versiones de OpenTTD anteriores a v1.0.1 aceptan una contraseña corporativa para autenticación en respuesta a una petición a la contraseña del servidor, permite a usuarios autenticados remotamente evitar restricciones de acceso establecidas o causar una denegación de servicio (caída del demonio) enviando un paquete de contraseña corporativa. • http://bugs.openttd.org/task/3754 http://secunia.com/advisories/39669 http://security.openttd.org/en/CVE-2010-0401 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.5EPSS: 0%CPEs: 52EXPL: 0

OpenTTD before 1.0.1 does not properly validate index values of certain items, which allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted in-game command. Versiones de OpenTTD anteriores a v1.0.1 no validan correctamente los valores índice de ciertos elementos, esto permite a usuarios autenticados remotamente causar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección a través de comandos del juego manipulados. • http://secunia.com/advisories/39669 http://security.openttd.org/en/CVE-2010-0402 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.0EPSS: 0%CPEs: 52EXPL: 0

OpenTTD before 1.0.1 allows remote attackers to cause a denial of service (file-descriptor exhaustion and daemon crash) by performing incomplete downloads of the map. Versiones de OpenTTD anteriores a v1.0.1 permiten a atacantes remotos causar una denegación de servicio (agotamiento del descriptor de fichero y caída del demonio) realizando descargas incompletas del mapa. • http://bugs.openttd.org/task/3785 http://secunia.com/advisories/39669 http://security.openttd.org/en/CVE-2010-0406 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 2%CPEs: 52EXPL: 0

Unspecified vulnerability in the NormaliseTrainConsist function in src/train_cmd.cpp in OpenTTD before 0.7.5-RC1 allows remote attackers to cause a denial of service (daemon crash) via certain game actions involving a wagon and a dual-headed engine. Vulnerabilidad no especificada en la función NormaliseTrainConsist en src/train_cmd.cpp en OpenTTD versiones anteriores a v0.7.5-RC1 permite a atacantes remotos provocar una denegación de servicio (parada del demonio) mediante ciertas acciones del juego relacionadas con un vagón y una máquina con doble motor. • http://binaries.openttd.org/releases/0.7.5/changelog.txt http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033754.html http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033896.html http://osvdb.org/61356 http://secunia.com/advisories/37929 http://secunia.com/advisories/37984 http://vcs.openttd.org/svn/changeset/18462/trunk/src/train_cmd.cpp http://www.openttd.org/en/news/112 http://www.openwall.com/lists/oss-security/2009/12/24/1 •