CVE-2008-3547
https://notcve.org/view.php?id=CVE-2008-3547
Buffer overflow in the server in OpenTTD 0.6.1 and earlier allows remote authenticated users to cause a denial of service (persistent game disruption) or possibly execute arbitrary code via vectors involving many long names for "companies and clients." Desbordamiento de búfer en el servidor en OpenTTD v0.6.1 y anteriores permite a usuarios remotos autentificados producir una denegación de servicio (continua interrupción del juego) o posiblemente ejecutar código arbitrario a través de vectores incluyendo muchos nombres largos para "compañías y clientes". • http://bugs.debian.org/493714 http://bugs.gentoo.org/show_bug.cgi?id=233929 http://marc.info/?l=oss-security&m=121787604812284&w=2 http://marc.info/?l=oss-security&m=121790659421159&w=2 http://marc.info/?l=oss-security&m=121797672406282&w=2 http://marc.info/? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-3576
https://notcve.org/view.php?id=CVE-2008-3576
Buffer overflow in the TruncateString function in src/gfx.cpp in OpenTTD before 0.6.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted string. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer en la función TruncateString en src/gfx.cpp en OpenTTD anterior a 0.6.2, permite a atacantes remotos provocar una denegación de servicio (caída de demonio) o posiblemente la ejecución de código de su elección a través de una cadena manipulada. NOTA: algunos de estos detalles se han obtenido a partir de información de terceros. • http://bugs.gentoo.org/show_bug.cgi?id=233929 http://secunia.com/advisories/31350 http://secunia.com/advisories/34161 http://security.gentoo.org/glsa/glsa-200903-09.xml http://sourceforge.net/project/shownotes.php?release_id=617243 http://www.openttd.org/index.php http://www.securityfocus.com/bid/30525 http://www.vupen.com/english/advisories/2008/2285 https://exchange.xforce.ibmcloud.com/vulnerabilities/44168 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-3577
https://notcve.org/view.php?id=CVE-2008-3577
Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments. Desbordamiento de búfer en src/openttd.cpp en OpenTTD anterior a 0.6.2, permite a usuarios locales ejecutar código de su elección a través de un nombre de archivo largo proporcionando el parámetro "-g" en la función ttd_main. NOTA: es inverosímil que esta cuestión pueda sobrepasar los límites de privilegios en entornos típicos(estándar). • http://bugs.gentoo.org/show_bug.cgi?id=233929 http://secunia.com/advisories/34161 http://security.gentoo.org/glsa/glsa-200903-09.xml http://sourceforge.net/project/shownotes.php?release_id=617243 http://www.securityfocus.com/bid/30525 http://www.vupen.com/english/advisories/2008/2285 https://exchange.xforce.ibmcloud.com/vulnerabilities/44436 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-1998 – OpenTTD 0.4.7 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2006-1998
OpenTTD 0.4.7 and earlier allows local users to cause a denial of service (application exit) via a large invalid error number, which triggers an error. • https://www.exploit-db.com/exploits/1709 http://aluigi.altervista.org/adv/openttdx-adv.txt http://secunia.com/advisories/19768 http://secunia.com/advisories/21799 http://security.gentoo.org/glsa/glsa-200609-03.xml http://www.securityfocus.com/archive/1/431871/100/0/threaded http://www.securityfocus.com/bid/17661 http://www.vupen.com/english/advisories/2006/1480 https://exchange.xforce.ibmcloud.com/vulnerabilities/26000 •
CVE-2005-2763
https://notcve.org/view.php?id=CVE-2005-2763
Multiple format string vulnerabilities in OpenTTD before 0.4.0.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. • http://bugs.gentoo.org/show_bug.cgi?id=102631 http://www.gentoo.org/security/en/glsa/glsa-200509-03.xml http://www.vupen.com/english/advisories/2005/1640 •