Page 3 of 14 results (0.002 seconds)

CVSS: 10.0EPSS: 8%CPEs: 3EXPL: 0

Buffer overflow in the TruncateString function in src/gfx.cpp in OpenTTD before 0.6.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted string. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer en la función TruncateString en src/gfx.cpp en OpenTTD anterior a 0.6.2, permite a atacantes remotos provocar una denegación de servicio (caída de demonio) o posiblemente la ejecución de código de su elección a través de una cadena manipulada. NOTA: algunos de estos detalles se han obtenido a partir de información de terceros. • http://bugs.gentoo.org/show_bug.cgi?id=233929 http://secunia.com/advisories/31350 http://secunia.com/advisories/34161 http://security.gentoo.org/glsa/glsa-200903-09.xml http://sourceforge.net/project/shownotes.php?release_id=617243 http://www.openttd.org/index.php http://www.securityfocus.com/bid/30525 http://www.vupen.com/english/advisories/2008/2285 https://exchange.xforce.ibmcloud.com/vulnerabilities/44168 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.6EPSS: 0%CPEs: 48EXPL: 0

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments. Desbordamiento de búfer en src/openttd.cpp en OpenTTD anterior a 0.6.2, permite a usuarios locales ejecutar código de su elección a través de un nombre de archivo largo proporcionando el parámetro "-g" en la función ttd_main. NOTA: es inverosímil que esta cuestión pueda sobrepasar los límites de privilegios en entornos típicos(estándar). • http://bugs.gentoo.org/show_bug.cgi?id=233929 http://secunia.com/advisories/34161 http://security.gentoo.org/glsa/glsa-200903-09.xml http://sourceforge.net/project/shownotes.php?release_id=617243 http://www.securityfocus.com/bid/30525 http://www.vupen.com/english/advisories/2008/2285 https://exchange.xforce.ibmcloud.com/vulnerabilities/44436 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.1EPSS: 0%CPEs: 19EXPL: 2

OpenTTD 0.4.7 and earlier allows local users to cause a denial of service (application exit) via a large invalid error number, which triggers an error. • https://www.exploit-db.com/exploits/1709 http://aluigi.altervista.org/adv/openttdx-adv.txt http://secunia.com/advisories/19768 http://secunia.com/advisories/21799 http://security.gentoo.org/glsa/glsa-200609-03.xml http://www.securityfocus.com/archive/1/431871/100/0/threaded http://www.securityfocus.com/bid/17661 http://www.vupen.com/english/advisories/2006/1480 https://exchange.xforce.ibmcloud.com/vulnerabilities/26000 •

CVSS: 7.5EPSS: 2%CPEs: 15EXPL: 0

Multiple format string vulnerabilities in OpenTTD before 0.4.0.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. • http://bugs.gentoo.org/show_bug.cgi?id=102631 http://www.gentoo.org/security/en/glsa/glsa-200509-03.xml http://www.vupen.com/english/advisories/2005/1640 •