First published: Tue Sep 06 2005(Updated: )
Multiple format string vulnerabilities in OpenTTD before 0.4.0.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openr Opentmpfiles | =0.1.3 | |
Openr Opentmpfiles | =0.1.2 | |
Openr Opentmpfiles | =0.2.1 | |
Openr Opentmpfiles | =0.2.0 | |
Openr Opentmpfiles | =0.3.3 | |
Openr Opentmpfiles | =0.3.1 | |
Openr Opentmpfiles | =0.3.6 | |
Openr Opentmpfiles | =0.3.4 | |
Openr Opentmpfiles | =0.1.4 | |
Openr Opentmpfiles | =0.3.0 | |
Openr Opentmpfiles | =0.4.0 | |
Openr Opentmpfiles | =0.3.2 | |
Openr Opentmpfiles | =0.1.1 | |
Openr Opentmpfiles | =0.3.5 | |
Openr Opentmpfiles | =0.3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2763 has a critical severity level due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2005-2763, upgrade OpenTTD to version 0.4.0.1 or later where the vulnerabilities have been addressed.
CVE-2005-2763 affects OpenTTD versions 0.1.1 to 0.4.0.
CVE-2005-2763 can be exploited by remote attackers to cause a denial of service (crash) and potentially execute arbitrary code.
There are no known effective workarounds for CVE-2005-2763, so updating to a non-vulnerable version is the recommended action.