First published: Thu Sep 08 2011(Updated: )
Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openr Opentmpfiles | <=1.1.2 | |
Openr Opentmpfiles | =0.1.1 | |
Openr Opentmpfiles | =0.1.2 | |
Openr Opentmpfiles | =0.1.3 | |
Openr Opentmpfiles | =0.1.4 | |
Openr Opentmpfiles | =0.2.0 | |
Openr Opentmpfiles | =0.2.1 | |
Openr Opentmpfiles | =0.3.0 | |
Openr Opentmpfiles | =0.3.1 | |
Openr Opentmpfiles | =0.3.2 | |
Openr Opentmpfiles | =0.3.2.1 | |
Openr Opentmpfiles | =0.3.3 | |
Openr Opentmpfiles | =0.3.4 | |
Openr Opentmpfiles | =0.3.5 | |
Openr Opentmpfiles | =0.3.6 | |
Openr Opentmpfiles | =0.3.7 | |
Openr Opentmpfiles | =0.4.0 | |
Openr Opentmpfiles | =0.4.0.1 | |
Openr Opentmpfiles | =0.4.5 | |
Openr Opentmpfiles | =0.4.6 | |
Openr Opentmpfiles | =0.4.7 | |
Openr Opentmpfiles | =0.4.8 | |
Openr Opentmpfiles | =0.4.8-rc1 | |
Openr Opentmpfiles | =0.4.8-rc2 | |
Openr Opentmpfiles | =0.5.0 | |
Openr Opentmpfiles | =0.5.0-rc1 | |
Openr Opentmpfiles | =0.5.0-rc2 | |
Openr Opentmpfiles | =0.5.0-rc3 | |
Openr Opentmpfiles | =0.5.0-rc4 | |
Openr Opentmpfiles | =0.5.0-rc5 | |
Openr Opentmpfiles | =0.5.1 | |
Openr Opentmpfiles | =0.5.1-rc1 | |
Openr Opentmpfiles | =0.5.1-rc2 | |
Openr Opentmpfiles | =0.5.1-rc3 | |
Openr Opentmpfiles | =0.5.2 | |
Openr Opentmpfiles | =0.5.2-rc1 | |
Openr Opentmpfiles | =0.5.3 | |
Openr Opentmpfiles | =0.5.3-rc1 | |
Openr Opentmpfiles | =0.5.3-rc2 | |
Openr Opentmpfiles | =0.5.3-rc3 | |
Openr Opentmpfiles | =0.6.0 | |
Openr Opentmpfiles | =0.6.0-beta1 | |
Openr Opentmpfiles | =0.6.0-beta2 | |
Openr Opentmpfiles | =0.6.0-beta3 | |
Openr Opentmpfiles | =0.6.0-beta4 | |
Openr Opentmpfiles | =0.6.0-beta5 | |
Openr Opentmpfiles | =0.6.0-rc1 | |
Openr Opentmpfiles | =0.6.1 | |
Openr Opentmpfiles | =0.6.1-rc1 | |
Openr Opentmpfiles | =0.6.1-rc2 | |
Openr Opentmpfiles | =0.6.2 | |
Openr Opentmpfiles | =0.6.2-rc1 | |
Openr Opentmpfiles | =0.6.2-rc2 | |
Openr Opentmpfiles | =0.6.3 | |
Openr Opentmpfiles | =0.6.3-rc1 | |
Openr Opentmpfiles | =0.7.0 | |
Openr Opentmpfiles | =0.7.0-beta1 | |
Openr Opentmpfiles | =0.7.0-beta2 | |
Openr Opentmpfiles | =0.7.0-rc1 | |
Openr Opentmpfiles | =0.7.0-rc2 | |
Openr Opentmpfiles | =0.7.1 | |
Openr Opentmpfiles | =0.7.1-rc1 | |
Openr Opentmpfiles | =0.7.1-rc2 | |
Openr Opentmpfiles | =0.7.1-rc3 | |
Openr Opentmpfiles | =0.7.2 | |
Openr Opentmpfiles | =0.7.2-rc1 | |
Openr Opentmpfiles | =0.7.2-rc2 | |
Openr Opentmpfiles | =0.7.3 | |
Openr Opentmpfiles | =0.7.3-rc1 | |
Openr Opentmpfiles | =0.7.3-rc2 | |
Openr Opentmpfiles | =0.7.4 | |
Openr Opentmpfiles | =0.7.4-rc1 | |
Openr Opentmpfiles | =0.7.5 | |
Openr Opentmpfiles | =0.7.5-rc1 | |
Openr Opentmpfiles | =1.0.0 | |
Openr Opentmpfiles | =1.0.0-beta1 | |
Openr Opentmpfiles | =1.0.0-beta2 | |
Openr Opentmpfiles | =1.0.0-beta3 | |
Openr Opentmpfiles | =1.0.0-beta4 | |
Openr Opentmpfiles | =1.0.0-rc1 | |
Openr Opentmpfiles | =1.0.0-rc2 | |
Openr Opentmpfiles | =1.0.0-rc3 | |
Openr Opentmpfiles | =1.0.1 | |
Openr Opentmpfiles | =1.0.1-rc1 | |
Openr Opentmpfiles | =1.0.1-rc2 | |
Openr Opentmpfiles | =1.0.2 | |
Openr Opentmpfiles | =1.0.2-rc1 | |
Openr Opentmpfiles | =1.0.3 | |
Openr Opentmpfiles | =1.0.3-rc1 | |
Openr Opentmpfiles | =1.0.4 | |
Openr Opentmpfiles | =1.0.4-rc1 | |
Openr Opentmpfiles | =1.0.5 | |
Openr Opentmpfiles | =1.0.5-rc1 | |
Openr Opentmpfiles | =1.0.5-rc2 | |
Openr Opentmpfiles | =1.1.0 | |
Openr Opentmpfiles | =1.1.0-beta1 | |
Openr Opentmpfiles | =1.1.0-beta2 | |
Openr Opentmpfiles | =1.1.0-beta3 | |
Openr Opentmpfiles | =1.1.0-beta4 | |
Openr Opentmpfiles | =1.1.0-beta5 | |
Openr Opentmpfiles | =1.1.0-rc1 | |
Openr Opentmpfiles | =1.1.0-rc2 | |
Openr Opentmpfiles | =1.1.0-rc3 | |
Openr Opentmpfiles | =1.1.1 | |
Openr Opentmpfiles | =1.1.1-rc1 | |
Openr Opentmpfiles | =1.1.2-rc1 | |
Openr Opentmpfiles | =1.1.2-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3342 has been classified as a moderate severity issue allowing denial of service attacks and potential arbitrary code execution.
To fix CVE-2011-3342, upgrade to OpenTTD version 1.1.3 or later, which addresses the buffer overflow vulnerabilities.
CVE-2011-3342 affects multiple versions of OpenTTD, including versions from 0.1.2 to 1.1.2.
Failing to address CVE-2011-3342 could lead to service interruptions through crashes and potential execution of malicious code.
You can determine vulnerability by checking if your OpenTTD version is below 1.1.3, which is the fixed version for CVE-2011-3342.