CVE-2011-3342

critical

Description

Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.

References

http://www.securityfocus.com/bid/49439

http://www.debian.org/security/2012/dsa-2386

http://security.openttd.org/en/CVE-2011-3342

http://secunia.com/advisories/46075

http://openwall.com/lists/oss-security/2011/09/06/2

http://openwall.com/lists/oss-security/2011/09/02/4

http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html

http://bugs.openttd.org/task/4748

http://bugs.openttd.org/task/4717

Details

Source: Mitre, NVD

Published: 2011-09-08

Updated: 2012-01-19

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical