CVE-2008-3577
https://notcve.org/view.php?id=CVE-2008-3577
Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments. Desbordamiento de búfer en src/openttd.cpp en OpenTTD anterior a 0.6.2, permite a usuarios locales ejecutar código de su elección a través de un nombre de archivo largo proporcionando el parámetro "-g" en la función ttd_main. NOTA: es inverosímil que esta cuestión pueda sobrepasar los límites de privilegios en entornos típicos(estándar). • http://bugs.gentoo.org/show_bug.cgi?id=233929 http://secunia.com/advisories/34161 http://security.gentoo.org/glsa/glsa-200903-09.xml http://sourceforge.net/project/shownotes.php?release_id=617243 http://www.securityfocus.com/bid/30525 http://www.vupen.com/english/advisories/2008/2285 https://exchange.xforce.ibmcloud.com/vulnerabilities/44436 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-1998 – OpenTTD 0.4.7 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2006-1998
OpenTTD 0.4.7 and earlier allows local users to cause a denial of service (application exit) via a large invalid error number, which triggers an error. • https://www.exploit-db.com/exploits/1709 http://aluigi.altervista.org/adv/openttdx-adv.txt http://secunia.com/advisories/19768 http://secunia.com/advisories/21799 http://security.gentoo.org/glsa/glsa-200609-03.xml http://www.securityfocus.com/archive/1/431871/100/0/threaded http://www.securityfocus.com/bid/17661 http://www.vupen.com/english/advisories/2006/1480 https://exchange.xforce.ibmcloud.com/vulnerabilities/26000 •
CVE-2006-1999 – OpenTTD 0.4.7 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2006-1999
The multiplayer menu in OpenTTD 0.4.7 allows remote attackers to cause a denial of service via a UDP packet with an incorrect size, which causes the client to return to the main menu. • https://www.exploit-db.com/exploits/1709 http://aluigi.altervista.org/adv/openttdx-adv.txt http://secunia.com/advisories/19768 http://secunia.com/advisories/21799 http://security.gentoo.org/glsa/glsa-200609-03.xml http://www.securityfocus.com/archive/1/431871/100/0/threaded http://www.securityfocus.com/bid/17661 http://www.vupen.com/english/advisories/2006/1480 https://exchange.xforce.ibmcloud.com/vulnerabilities/26004 •
CVE-2005-2764
https://notcve.org/view.php?id=CVE-2005-2764
Multiple buffer overflows in OpenTTD before 0.4.0.1 allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. • http://bugs.gentoo.org/show_bug.cgi?id=102631 http://www.gentoo.org/security/en/glsa/glsa-200509-03.xml http://www.vupen.com/english/advisories/2005/1640 •
CVE-2005-2763
https://notcve.org/view.php?id=CVE-2005-2763
Multiple format string vulnerabilities in OpenTTD before 0.4.0.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. • http://bugs.gentoo.org/show_bug.cgi?id=102631 http://www.gentoo.org/security/en/glsa/glsa-200509-03.xml http://www.vupen.com/english/advisories/2005/1640 •