CVE-2012-0048
https://notcve.org/view.php?id=CVE-2012-0048
OpenTTD 0.3.5 through 1.1.4 allows remote attackers to cause a denial of service (game pause) by connecting to the server and not finishing the (1) authorization phase or (2) map download, aka a "slow read" attack. OpenTTD 0.3.5 a través de 1.1.4 permite a atacantes remotos provocar una denegación de servicio (pausa el juego) mediante la conexión con el servidor y no termina la fase de autorización (1) o (2) mapa download, también conocido como una "lectura lenta" ataque. • http://bugs.openttd.org/task/4955 http://secunia.com/advisories/50137 http://security.openttd.org/en/CVE-2012-0049 http://vcs.openttd.org/svn/changeset/23764 http://www.debian.org/security/2012/dsa-2524 http://www.openwall.com/lists/oss-security/2012/01/07/2 http://www.openwall.com/lists/oss-security/2012/01/13/8 http://www.tt-forums.net/viewtopic.php?f=33&t=58073&hilit=pause#p989303 • CWE-399: Resource Management Errors •
CVE-2012-0049
https://notcve.org/view.php?id=CVE-2012-0049
OpenTTD before 1.1.5 contains a Denial of Service (slow read attack) that prevents users from joining the server. OpenTTD versiones anteriores a 1.1.5, contiene una Denegación de Servicio (ataque de lectura lenta) que impide que los usuarios se unan al servidor. • http://security.openttd.org/en/CVE-2012-0049 http://www.debian.org/security/2012/dsa-2524 http://www.openwall.com/lists/oss-security/2012/01/13/9 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0049 https://security-tracker.debian.org/tracker/CVE-2012-0049 • CWE-400: Uncontrolled Resource Consumption •
CVE-2011-3342
https://notcve.org/view.php?id=CVE-2011-3342
Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame. Múltiples desbordamientos de buffer en OpenTTD antes de v1.1.3, permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecucar código de su elección a través de vectores relacionados con (1) NAME, (2) PLYR, (3) CHTS, o (4) AIPL (también conocido como AI config) • http://bugs.openttd.org/task/4717 http://bugs.openttd.org/task/4748 http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html http://openwall.com/lists/oss-security/2011/09/02/4 http://openwall.com/lists/oss-security/2011/09/06/2 http://secunia.com/advisories/46075 http://security.openttd.org/en/CVE-2011-3342 http://www.debian.org/security/2012/dsa-2386 http://www.securityfocus.com/bid/49439 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-3341
https://notcve.org/view.php?id=CVE-2011-3341
Multiple off-by-one errors in order_cmd.cpp in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted CMD_INSERT_ORDER command. Múltiples errores off-by-one en order_cmd.cpp en OpenTTD antes de v1.1.3, permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección a través de un comando CMD_INSERT_ORDER • http://bugs.openttd.org/task/4745 http://bugs.openttd.org/task/4745/getfile/7707/fixcmds.diff http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html http://openwall.com/lists/oss-security/2011/09/02/4 http://openwall.com/lists/oss-security/2011/09/06/2 http://secunia.com/advisories/46075 http://security.openttd.org/en/CVE-2011-3341 http://www.debian.org/security/2012/dsa-2386 http://www.securityfocus.com/bid/49439 • CWE-189: Numeric Errors •
CVE-2011-3343
https://notcve.org/view.php?id=CVE-2011-3343
Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file. Múltiples desbordamientos de buffer en OpenTTD antes de v1.1.3, permite a usuarios locales provocar una denegación de servicio (caída del demonio) o posiblemente ganar privilegios a través de (1) un archivo BMP modificado con compresión RLE o (2) un archivo BMP con dimensiones modificadas. • http://bugs.openttd.org/task/4746 http://bugs.openttd.org/task/4747 http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html http://openwall.com/lists/oss-security/2011/09/02/4 http://openwall.com/lists/oss-security/2011/09/06/2 http://secunia.com/advisories/46075 http://security.openttd.org/en/CVE-2011-3343 http://www.debian.org/security/2012/dsa-2386 http://www.securityfocus.com/bid/49439 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •