4 results (0.007 seconds)

CVSS: 5.0EPSS: 4%CPEs: 53EXPL: 1

The HandleCrashedAircraft function in aircraft_cmd.cpp in OpenTTD 0.3.6 through 1.3.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) by crashing an aircraft outside of the map. La función HandleCrashedAircraft en aircraft_cmd.cpp en OpenTTD 0.3.6 hasta la 1.3.2 permite a atacantes remotos provocar una denegación de servicio (lectura fuera de límites y caída) por estrellarse un avión fuera del mapa. • http://bugs.openttd.org/task/5820 http://lists.opensuse.org/opensuse-updates/2013-12/msg00095.html http://seclists.org/oss-sec/2013/q4/375 http://secunia.com/advisories/55589 http://secunia.com/advisories/56218 http://vcs.openttd.org/svn/changeset/26134 http://www.securityfocus.com/bid/64003 https://exchange.xforce.ibmcloud.com/vulnerabilities/89334 https://security.openttd.org/en/CVE-2013-6411 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 5%CPEs: 85EXPL: 1

OpenTTD 0.3.5 through 1.1.4 allows remote attackers to cause a denial of service (game pause) by connecting to the server and not finishing the (1) authorization phase or (2) map download, aka a "slow read" attack. OpenTTD 0.3.5 a través de 1.1.4 permite a atacantes remotos provocar una denegación de servicio (pausa el juego) mediante la conexión con el servidor y no termina la fase de autorización (1) o (2) mapa download, también conocido como una "lectura lenta" ataque. • http://bugs.openttd.org/task/4955 http://secunia.com/advisories/50137 http://security.openttd.org/en/CVE-2012-0049 http://vcs.openttd.org/svn/changeset/23764 http://www.debian.org/security/2012/dsa-2524 http://www.openwall.com/lists/oss-security/2012/01/07/2 http://www.openwall.com/lists/oss-security/2012/01/13/8 http://www.tt-forums.net/viewtopic.php?f=33&t=58073&hilit=pause#p989303 • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

OpenTTD before 1.1.5 contains a Denial of Service (slow read attack) that prevents users from joining the server. OpenTTD versiones anteriores a 1.1.5, contiene una Denegación de Servicio (ataque de lectura lenta) que impide que los usuarios se unan al servidor. • http://security.openttd.org/en/CVE-2012-0049 http://www.debian.org/security/2012/dsa-2524 http://www.openwall.com/lists/oss-security/2012/01/13/9 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0049 https://security-tracker.debian.org/tracker/CVE-2012-0049 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.0EPSS: 5%CPEs: 38EXPL: 1

OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to clear a water tile, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a certain sequence of steps related to "the water/coast aspect of tiles which also have railtracks on one half." OpenTTD 0.6.0 a la 1.2.1 no valida adecuadamente las peticiones para limpiar el "water tile", lo que permite a atacantes remotos provocar una denegación de servicio (deferencia a puntero nulo y caída de servidor) a través de determinadas secuencias de pasos relacionados con "the water/coast aspect of tiles which also have railtracks on one half." • http://bugs.openttd.org/task/5254 http://lists.opensuse.org/opensuse-updates/2012-08/msg00043.html http://secunia.com/advisories/50042 http://security.openttd.org/en/CVE-2012-3436 http://vcs.openttd.org/svn/changeset/24439 http://vcs.openttd.org/svn/changeset/24449 http://www.openwall.com/lists/oss-security/2012/07/27/5 http://www.openwall.com/lists/oss-security/2012/07/28/7 http://www.openwall.com/lists/oss-security/2012/07/31/5 http://www.securityfo • CWE-20: Improper Input Validation •