First published: Wed Nov 17 2010(Updated: )
Multiple use-after-free vulnerabilities in OpenTTD 1.0.x before 1.0.5 allow (1) remote attackers to cause a denial of service (invalid write and daemon crash) by abruptly disconnecting during transmission of the map from the server, related to network/network_server.cpp; (2) remote attackers to cause a denial of service (invalid read and daemon crash) by abruptly disconnecting, related to network/network_server.cpp; and (3) remote servers to cause a denial of service (invalid read and application crash) by forcing a disconnection during the join process, related to network/network.cpp.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenTTD | =1.0.0 | |
OpenTTD | =1.0.0-beta1 | |
OpenTTD | =1.0.0-beta2 | |
OpenTTD | =1.0.0-beta3 | |
OpenTTD | =1.0.0-beta4 | |
OpenTTD | =1.0.0-rc1 | |
OpenTTD | =1.0.0-rc2 | |
OpenTTD | =1.0.0-rc3 | |
OpenTTD | =1.0.1 | |
OpenTTD | =1.0.1-rc1 | |
OpenTTD | =1.0.1-rc2 | |
OpenTTD | =1.0.2 | |
OpenTTD | =1.0.2-rc1 | |
OpenTTD | =1.0.3 | |
OpenTTD | =1.0.3-rc1 | |
OpenTTD | =1.0.4 | |
OpenTTD | =1.0.4-rc1 | |
OpenTTD | =1.0.5-rc1 | |
OpenTTD | =1.0.5-rc2 | |
OpenTTD | >=1.0.0<1.0.5 | |
Fedora | =13 | |
Fedora | =14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4168 has a medium severity rating as it can lead to denial of service.
To fix CVE-2010-4168, upgrade OpenTTD to version 1.0.5 or later.
CVE-2010-4168 affects OpenTTD versions from 1.0.0 to 1.0.4.
Attackers could exploit CVE-2010-4168 to cause a crash of the server's daemon through abrupt disconnections.
Yes, there are patches available to address CVE-2010-4168, but upgrading is recommended.