First published: Sun Aug 10 2008(Updated: )
Buffer overflow in the TruncateString function in src/gfx.cpp in OpenTTD before 0.6.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted string. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openr Opentmpfiles | =0.6.2-rc1 | |
Openr Opentmpfiles | =0.6.1 | |
Openr Opentmpfiles | <=0.6.2-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3576 has a medium severity rating due to potential denial of service and possible remote code execution.
To fix CVE-2008-3576, upgrade OpenTTD to version 0.6.2 or later.
CVE-2008-3576 affects OpenTTD versions 0.6.1 and all previous versions up to 0.6.2-rc2.
CVE-2008-3576 is classified as a buffer overflow vulnerability.
Exploiting CVE-2008-3576 may allow remote attackers to crash the service or execute arbitrary code.