CVE-2011-3342
Published: 8 September 2011
Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
Priority
Status
Package | Release | Status |
---|---|---|
openttd Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(1.1.4-1)
|
|
quantal |
Not vulnerable
(1.2.0-1)
|
|
raring |
Not vulnerable
(1.2.0-1)
|
|
saucy |
Not vulnerable
(1.2.0-1)
|
|
upstream |
Released
(1.1.3)
|