Multiple vulnerabilities in openttd.com OpenTTD



| Updated: 2020-08-11
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2011-3341
CVE-2011-3342
CVE-2011-3343
CWE-ID CWE-20
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
OpenTTD
Other software / Other software solutions

Vendor openttd.com

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU44746

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3341

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Multiple off-by-one errors in order_cmd.cpp in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted CMD_INSERT_ORDER command.

Mitigation

Install update from vendor's website.

Vulnerable software versions

OpenTTD: 0.1.1 - 1.1.2

CPE2.3 External links

https://bugs.openttd.org/task/4745
https://bugs.openttd.org/task/4745/getfile/7707/fixcmds.diff
https://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html
https://openwall.com/lists/oss-security/2011/09/02/4
https://openwall.com/lists/oss-security/2011/09/06/2
https://secunia.com/advisories/46075
https://security.openttd.org/en/CVE-2011-3341
https://www.debian.org/security/2012/dsa-2386
https://www.securityfocus.com/bid/49439


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU44747

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3342

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.

Mitigation

Install update from vendor's website.

Vulnerable software versions

OpenTTD: 0.1.1 - 1.1.2

CPE2.3 External links

https://bugs.openttd.org/task/4717
https://bugs.openttd.org/task/4748
https://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html
https://openwall.com/lists/oss-security/2011/09/02/4
https://openwall.com/lists/oss-security/2011/09/06/2
https://secunia.com/advisories/46075
https://security.openttd.org/en/CVE-2011-3342
https://www.debian.org/security/2012/dsa-2386
https://www.securityfocus.com/bid/49439


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU44748

Risk: Medium

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3343

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

OpenTTD: 0.1.1 - 1.1.2

CPE2.3 External links

https://bugs.openttd.org/task/4746
https://bugs.openttd.org/task/4747
https://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html
https://openwall.com/lists/oss-security/2011/09/02/4
https://openwall.com/lists/oss-security/2011/09/06/2
https://secunia.com/advisories/46075
https://security.openttd.org/en/CVE-2011-3343
https://www.debian.org/security/2012/dsa-2386
https://www.securityfocus.com/bid/49439


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###