Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2011-3341 CVE-2011-3342 CVE-2011-3343 |
CWE-ID | CWE-20 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
OpenTTD Other software / Other software solutions |
Vendor | openttd.com |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU44746
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-3341
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple off-by-one errors in order_cmd.cpp in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted CMD_INSERT_ORDER command.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenTTD: 0.1.1 - 1.1.2
CPE2.3https://bugs.openttd.org/task/4745
https://bugs.openttd.org/task/4745/getfile/7707/fixcmds.diff
https://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html
https://openwall.com/lists/oss-security/2011/09/02/4
https://openwall.com/lists/oss-security/2011/09/06/2
https://secunia.com/advisories/46075
https://security.openttd.org/en/CVE-2011-3341
https://www.debian.org/security/2012/dsa-2386
https://www.securityfocus.com/bid/49439
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU44747
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-3342
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenTTD: 0.1.1 - 1.1.2
CPE2.3https://bugs.openttd.org/task/4717
https://bugs.openttd.org/task/4748
https://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html
https://openwall.com/lists/oss-security/2011/09/02/4
https://openwall.com/lists/oss-security/2011/09/06/2
https://secunia.com/advisories/46075
https://security.openttd.org/en/CVE-2011-3342
https://www.debian.org/security/2012/dsa-2386
https://www.securityfocus.com/bid/49439
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU44748
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-3343
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenTTD: 0.1.1 - 1.1.2
CPE2.3https://bugs.openttd.org/task/4746
https://bugs.openttd.org/task/4747
https://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html
https://openwall.com/lists/oss-security/2011/09/02/4
https://openwall.com/lists/oss-security/2011/09/06/2
https://secunia.com/advisories/46075
https://security.openttd.org/en/CVE-2011-3343
https://www.debian.org/security/2012/dsa-2386
https://www.securityfocus.com/bid/49439
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.