CVE-2011-3342

Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openttd:openttd:*:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.7:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.8:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.8:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.4.8:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc4:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.0:rc5:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.1:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.1:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.3:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.3:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.5.3:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta4:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:beta5:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.1:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.2:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.3:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.1:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.1:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.2:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.3:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.3:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.4:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.5:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.1:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.3:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.4:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.5:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.5:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:beta4:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:beta5:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.2:rc2:*:*:*:*:*:*

History

21 Nov 2024, 01:30

Type Values Removed Values Added
References () http://bugs.openttd.org/task/4717 - Patch () http://bugs.openttd.org/task/4717 - Patch
References () http://bugs.openttd.org/task/4748 - Patch () http://bugs.openttd.org/task/4748 - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html -
References () http://openwall.com/lists/oss-security/2011/09/02/4 - Patch () http://openwall.com/lists/oss-security/2011/09/02/4 - Patch
References () http://openwall.com/lists/oss-security/2011/09/06/2 - Patch () http://openwall.com/lists/oss-security/2011/09/06/2 - Patch
References () http://secunia.com/advisories/46075 - () http://secunia.com/advisories/46075 -
References () http://security.openttd.org/en/CVE-2011-3342 - () http://security.openttd.org/en/CVE-2011-3342 -
References () http://www.debian.org/security/2012/dsa-2386 - () http://www.debian.org/security/2012/dsa-2386 -
References () http://www.securityfocus.com/bid/49439 - () http://www.securityfocus.com/bid/49439 -

Information

Published : 2011-09-08 18:55

Updated : 2024-11-21 01:30


NVD link : CVE-2011-3342

Mitre link : CVE-2011-3342

CVE.ORG link : CVE-2011-3342


JSON object : View

Products Affected

openttd

  • openttd
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer