First published: Thu Sep 08 2011(Updated: )
Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openr Opentmpfiles | <=1.1.2 | |
Openr Opentmpfiles | =0.1.1 | |
Openr Opentmpfiles | =0.1.2 | |
Openr Opentmpfiles | =0.1.3 | |
Openr Opentmpfiles | =0.1.4 | |
Openr Opentmpfiles | =0.2.0 | |
Openr Opentmpfiles | =0.2.1 | |
Openr Opentmpfiles | =0.3.0 | |
Openr Opentmpfiles | =0.3.1 | |
Openr Opentmpfiles | =0.3.2 | |
Openr Opentmpfiles | =0.3.2.1 | |
Openr Opentmpfiles | =0.3.3 | |
Openr Opentmpfiles | =0.3.4 | |
Openr Opentmpfiles | =0.3.5 | |
Openr Opentmpfiles | =0.3.6 | |
Openr Opentmpfiles | =0.3.7 | |
Openr Opentmpfiles | =0.4.0 | |
Openr Opentmpfiles | =0.4.0.1 | |
Openr Opentmpfiles | =0.4.5 | |
Openr Opentmpfiles | =0.4.6 | |
Openr Opentmpfiles | =0.4.7 | |
Openr Opentmpfiles | =0.4.8 | |
Openr Opentmpfiles | =0.4.8-rc1 | |
Openr Opentmpfiles | =0.4.8-rc2 | |
Openr Opentmpfiles | =0.5.0 | |
Openr Opentmpfiles | =0.5.0-rc1 | |
Openr Opentmpfiles | =0.5.0-rc2 | |
Openr Opentmpfiles | =0.5.0-rc3 | |
Openr Opentmpfiles | =0.5.0-rc4 | |
Openr Opentmpfiles | =0.5.0-rc5 | |
Openr Opentmpfiles | =0.5.1 | |
Openr Opentmpfiles | =0.5.1-rc1 | |
Openr Opentmpfiles | =0.5.1-rc2 | |
Openr Opentmpfiles | =0.5.1-rc3 | |
Openr Opentmpfiles | =0.5.2 | |
Openr Opentmpfiles | =0.5.2-rc1 | |
Openr Opentmpfiles | =0.5.3 | |
Openr Opentmpfiles | =0.5.3-rc1 | |
Openr Opentmpfiles | =0.5.3-rc2 | |
Openr Opentmpfiles | =0.5.3-rc3 | |
Openr Opentmpfiles | =0.6.0 | |
Openr Opentmpfiles | =0.6.0-beta1 | |
Openr Opentmpfiles | =0.6.0-beta2 | |
Openr Opentmpfiles | =0.6.0-beta3 | |
Openr Opentmpfiles | =0.6.0-beta4 | |
Openr Opentmpfiles | =0.6.0-beta5 | |
Openr Opentmpfiles | =0.6.0-rc1 | |
Openr Opentmpfiles | =0.6.1 | |
Openr Opentmpfiles | =0.6.1-rc1 | |
Openr Opentmpfiles | =0.6.1-rc2 | |
Openr Opentmpfiles | =0.6.2 | |
Openr Opentmpfiles | =0.6.2-rc1 | |
Openr Opentmpfiles | =0.6.2-rc2 | |
Openr Opentmpfiles | =0.6.3 | |
Openr Opentmpfiles | =0.6.3-rc1 | |
Openr Opentmpfiles | =0.7.0 | |
Openr Opentmpfiles | =0.7.0-beta1 | |
Openr Opentmpfiles | =0.7.0-beta2 | |
Openr Opentmpfiles | =0.7.0-rc1 | |
Openr Opentmpfiles | =0.7.0-rc2 | |
Openr Opentmpfiles | =0.7.1 | |
Openr Opentmpfiles | =0.7.1-rc1 | |
Openr Opentmpfiles | =0.7.1-rc2 | |
Openr Opentmpfiles | =0.7.1-rc3 | |
Openr Opentmpfiles | =0.7.2 | |
Openr Opentmpfiles | =0.7.2-rc1 | |
Openr Opentmpfiles | =0.7.2-rc2 | |
Openr Opentmpfiles | =0.7.3 | |
Openr Opentmpfiles | =0.7.3-rc1 | |
Openr Opentmpfiles | =0.7.3-rc2 | |
Openr Opentmpfiles | =0.7.4 | |
Openr Opentmpfiles | =0.7.4-rc1 | |
Openr Opentmpfiles | =0.7.5 | |
Openr Opentmpfiles | =0.7.5-rc1 | |
Openr Opentmpfiles | =1.0.0 | |
Openr Opentmpfiles | =1.0.0-beta1 | |
Openr Opentmpfiles | =1.0.0-beta2 | |
Openr Opentmpfiles | =1.0.0-beta3 | |
Openr Opentmpfiles | =1.0.0-beta4 | |
Openr Opentmpfiles | =1.0.0-rc1 | |
Openr Opentmpfiles | =1.0.0-rc2 | |
Openr Opentmpfiles | =1.0.0-rc3 | |
Openr Opentmpfiles | =1.0.1 | |
Openr Opentmpfiles | =1.0.1-rc1 | |
Openr Opentmpfiles | =1.0.1-rc2 | |
Openr Opentmpfiles | =1.0.2 | |
Openr Opentmpfiles | =1.0.2-rc1 | |
Openr Opentmpfiles | =1.0.3 | |
Openr Opentmpfiles | =1.0.3-rc1 | |
Openr Opentmpfiles | =1.0.4 | |
Openr Opentmpfiles | =1.0.4-rc1 | |
Openr Opentmpfiles | =1.0.5 | |
Openr Opentmpfiles | =1.0.5-rc1 | |
Openr Opentmpfiles | =1.0.5-rc2 | |
Openr Opentmpfiles | =1.1.0 | |
Openr Opentmpfiles | =1.1.0-beta1 | |
Openr Opentmpfiles | =1.1.0-beta2 | |
Openr Opentmpfiles | =1.1.0-beta3 | |
Openr Opentmpfiles | =1.1.0-beta4 | |
Openr Opentmpfiles | =1.1.0-beta5 | |
Openr Opentmpfiles | =1.1.0-rc1 | |
Openr Opentmpfiles | =1.1.0-rc2 | |
Openr Opentmpfiles | =1.1.0-rc3 | |
Openr Opentmpfiles | =1.1.1 | |
Openr Opentmpfiles | =1.1.1-rc1 | |
Openr Opentmpfiles | =1.1.2-rc1 | |
Openr Opentmpfiles | =1.1.2-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3343 has been classified as a denial of service vulnerability that could potentially lead to privilege escalation.
To fix CVE-2011-3343, upgrade OpenTTD to version 1.1.3 or later.
CVE-2011-3343 affects OpenTTD versions earlier than 1.1.3, including all versions from 0.1.1 to 1.1.2.
CVE-2011-3343 can be exploited through crafted BMP files, particularly those with RLE compression or manipulated dimensions.
Local users of affected versions of OpenTTD are at risk of experiencing crashes or privilege escalation due to CVE-2011-3343.