CVE-2010-2534

The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue.
References
Link Resource
http://bugs.openttd.org/task/3909 Patch
http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch Patch
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html
http://osvdb.org/66503
http://secunia.com/advisories/40630 Vendor Advisory
http://secunia.com/advisories/40760 Vendor Advisory
http://security.openttd.org/en/CVE-2010-2534 Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2010/07/20/1
http://www.securityfocus.com/bid/41804 Patch
http://www.vupen.com/english/advisories/2010/1888 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/1916 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/60568
http://bugs.openttd.org/task/3909 Patch
http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch Patch
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html
http://osvdb.org/66503
http://secunia.com/advisories/40630 Vendor Advisory
http://secunia.com/advisories/40760 Vendor Advisory
http://security.openttd.org/en/CVE-2010-2534 Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2010/07/20/1
http://www.securityfocus.com/bid/41804 Patch
http://www.vupen.com/english/advisories/2010/1888 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/1916 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/60568
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openttd:openttd:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.7:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.8:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.8:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.8:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc4:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc5:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.1:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.1:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.3:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.3:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.3:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta4:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta5:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.1:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.2:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.3:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.1:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.1:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.2:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.3:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.3:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.4:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.5:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.1:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.3:rc1:*:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () http://bugs.openttd.org/task/3909 - Patch () http://bugs.openttd.org/task/3909 - Patch
References () http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch - Patch () http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html -
References () http://osvdb.org/66503 - () http://osvdb.org/66503 -
References () http://secunia.com/advisories/40630 - Vendor Advisory () http://secunia.com/advisories/40630 - Vendor Advisory
References () http://secunia.com/advisories/40760 - Vendor Advisory () http://secunia.com/advisories/40760 - Vendor Advisory
References () http://security.openttd.org/en/CVE-2010-2534 - Patch, Vendor Advisory () http://security.openttd.org/en/CVE-2010-2534 - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2010/07/20/1 - () http://www.openwall.com/lists/oss-security/2010/07/20/1 -
References () http://www.securityfocus.com/bid/41804 - Patch () http://www.securityfocus.com/bid/41804 - Patch
References () http://www.vupen.com/english/advisories/2010/1888 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2010/1888 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1916 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1916 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/60568 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/60568 -

Information

Published : 2010-07-28 12:48

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2534

Mitre link : CVE-2010-2534

CVE.ORG link : CVE-2010-2534


JSON object : View

Products Affected

openttd

  • openttd
CWE
CWE-399

Resource Management Errors