9
CVSSv2

CVE-2008-3547

Published: 10/03/2009 Updated: 08/08/2017
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the server in OpenTTD 0.6.1 and previous versions allows remote authenticated users to cause a denial of service (persistent game disruption) or possibly execute arbitrary code via vectors involving many long names for "companies and clients."

Vulnerable Product Search on Vulmon Subscribe to Product

openttd openttd 0.4.7

openttd openttd 0.6.0

openttd openttd 0.6.1

openttd openttd 0.1.1

openttd openttd 0.1.4

openttd openttd 0.3.0

openttd openttd 0.5.3

openttd openttd 0.5.0

openttd openttd 0.5.1

openttd openttd

openttd openttd 0.4.8

openttd openttd 0.4.0.1

openttd openttd 0.4.0

openttd openttd 0.5.2

openttd openttd 0.2.1

openttd openttd 0.3.3

openttd openttd 0.3.6

openttd openttd 0.4.6

openttd openttd 0.4.5

openttd openttd 0.1.3

openttd openttd 0.3.2.1

openttd openttd 0.3.2

openttd openttd 0.3.4

openttd openttd 0.3.7

openttd openttd 0.1.2

openttd openttd 0.2.0

openttd openttd 0.3.1

openttd openttd 0.3.5

Vendor Advisories

Debian Bug report logs - #493714 openttd: Network exploitable buffer overrun Package: openttd; Maintainer for openttd is Matthijs Kooijman <matthijs@stdinnl>; Source for openttd is src:openttd (PTS, buildd, popcon) Reported by: rubidium@rbijkernet Date: Mon, 4 Aug 2008 12:57:01 UTC Severity: grave Tags: security Found ...