5
CVSSv2

CVE-2012-3436

Published: 09/10/2012 Updated: 29/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

OpenTTD 0.6.0 up to and including 1.2.1 does not properly validate requests to clear a water tile, which allows remote malicious users to cause a denial of service (NULL pointer dereference and server crash) via a certain sequence of steps related to "the water/coast aspect of tiles which also have railtracks on one half."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openttd openttd 1.0.0

openttd openttd 1.0.5

openttd openttd 0.7.3

openttd openttd 0.7.0

openttd openttd 1.0.4

openttd openttd 1.1.3

openttd openttd 1.1.0

openttd openttd 0.7.2

openttd openttd 1.1.1

openttd openttd 1.1.4

openttd openttd 1.0.3

openttd openttd 1.0.1

openttd openttd 0.6.0

openttd openttd 1.2.1

openttd openttd 0.7.5

openttd openttd 0.7.1

openttd openttd 1.1.5

openttd openttd 0.6.1

openttd openttd 0.7.4

openttd openttd 1.0.2

openttd openttd 1.2.0

openttd openttd 0.6.2

openttd openttd 0.6.3

openttd openttd 1.1.2

Vendor Advisories

Debian Bug report logs - #683258 CVE-2012-3436 Package: openttd; Maintainer for openttd is Matthijs Kooijman <matthijs@stdinnl>; Source for openttd is src:openttd (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Mon, 30 Jul 2012 08:48:04 UTC Severity: important Tags: security ...