7.5

CVE-2011-3342

Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpenttdOpenttd Version <= 1.1.2
OpenttdOpenttd Version0.1.1
OpenttdOpenttd Version0.1.2
OpenttdOpenttd Version0.1.3
OpenttdOpenttd Version0.1.4
OpenttdOpenttd Version0.2.0
OpenttdOpenttd Version0.2.1
OpenttdOpenttd Version0.3.0
OpenttdOpenttd Version0.3.1
OpenttdOpenttd Version0.3.2
OpenttdOpenttd Version0.3.2.1
OpenttdOpenttd Version0.3.3
OpenttdOpenttd Version0.3.4
OpenttdOpenttd Version0.3.5
OpenttdOpenttd Version0.3.6
OpenttdOpenttd Version0.3.7
OpenttdOpenttd Version0.4.0
OpenttdOpenttd Version0.4.0.1
OpenttdOpenttd Version0.4.5
OpenttdOpenttd Version0.4.6
OpenttdOpenttd Version0.4.7
OpenttdOpenttd Version0.4.8
OpenttdOpenttd Version0.4.8 Updaterc1
OpenttdOpenttd Version0.4.8 Updaterc2
OpenttdOpenttd Version0.5.0
OpenttdOpenttd Version0.5.0 Updaterc1
OpenttdOpenttd Version0.5.0 Updaterc2
OpenttdOpenttd Version0.5.0 Updaterc3
OpenttdOpenttd Version0.5.0 Updaterc4
OpenttdOpenttd Version0.5.0 Updaterc5
OpenttdOpenttd Version0.5.1
OpenttdOpenttd Version0.5.1 Updaterc1
OpenttdOpenttd Version0.5.1 Updaterc2
OpenttdOpenttd Version0.5.1 Updaterc3
OpenttdOpenttd Version0.5.2
OpenttdOpenttd Version0.5.2 Updaterc1
OpenttdOpenttd Version0.5.3
OpenttdOpenttd Version0.5.3 Updaterc1
OpenttdOpenttd Version0.5.3 Updaterc2
OpenttdOpenttd Version0.5.3 Updaterc3
OpenttdOpenttd Version0.6.0
OpenttdOpenttd Version0.6.0 Updatebeta1
OpenttdOpenttd Version0.6.0 Updatebeta2
OpenttdOpenttd Version0.6.0 Updatebeta3
OpenttdOpenttd Version0.6.0 Updatebeta4
OpenttdOpenttd Version0.6.0 Updatebeta5
OpenttdOpenttd Version0.6.0 Updaterc1
OpenttdOpenttd Version0.6.1
OpenttdOpenttd Version0.6.1 Updaterc1
OpenttdOpenttd Version0.6.1 Updaterc2
OpenttdOpenttd Version0.6.2
OpenttdOpenttd Version0.6.2 Updaterc1
OpenttdOpenttd Version0.6.2 Updaterc2
OpenttdOpenttd Version0.6.3
OpenttdOpenttd Version0.6.3 Updaterc1
OpenttdOpenttd Version0.7.0
OpenttdOpenttd Version0.7.0 Updatebeta1
OpenttdOpenttd Version0.7.0 Updatebeta2
OpenttdOpenttd Version0.7.0 Updaterc1
OpenttdOpenttd Version0.7.0 Updaterc2
OpenttdOpenttd Version0.7.1
OpenttdOpenttd Version0.7.1 Updaterc1
OpenttdOpenttd Version0.7.1 Updaterc2
OpenttdOpenttd Version0.7.1 Updaterc3
OpenttdOpenttd Version0.7.2
OpenttdOpenttd Version0.7.2 Updaterc1
OpenttdOpenttd Version0.7.2 Updaterc2
OpenttdOpenttd Version0.7.3
OpenttdOpenttd Version0.7.3 Updaterc1
OpenttdOpenttd Version0.7.3 Updaterc2
OpenttdOpenttd Version0.7.4
OpenttdOpenttd Version0.7.4 Updaterc1
OpenttdOpenttd Version0.7.5
OpenttdOpenttd Version0.7.5 Updaterc1
OpenttdOpenttd Version1.0.0
OpenttdOpenttd Version1.0.0 Updatebeta1
OpenttdOpenttd Version1.0.0 Updatebeta2
OpenttdOpenttd Version1.0.0 Updatebeta3
OpenttdOpenttd Version1.0.0 Updatebeta4
OpenttdOpenttd Version1.0.0 Updaterc1
OpenttdOpenttd Version1.0.0 Updaterc2
OpenttdOpenttd Version1.0.0 Updaterc3
OpenttdOpenttd Version1.0.1
OpenttdOpenttd Version1.0.1 Updaterc1
OpenttdOpenttd Version1.0.1 Updaterc2
OpenttdOpenttd Version1.0.2
OpenttdOpenttd Version1.0.2 Updaterc1
OpenttdOpenttd Version1.0.3
OpenttdOpenttd Version1.0.3 Updaterc1
OpenttdOpenttd Version1.0.4
OpenttdOpenttd Version1.0.4 Updaterc1
OpenttdOpenttd Version1.0.5
OpenttdOpenttd Version1.0.5 Updaterc1
OpenttdOpenttd Version1.0.5 Updaterc2
OpenttdOpenttd Version1.1.0
OpenttdOpenttd Version1.1.0 Updatebeta1
OpenttdOpenttd Version1.1.0 Updatebeta2
OpenttdOpenttd Version1.1.0 Updatebeta3
OpenttdOpenttd Version1.1.0 Updatebeta4
OpenttdOpenttd Version1.1.0 Updatebeta5
OpenttdOpenttd Version1.1.0 Updaterc1
OpenttdOpenttd Version1.1.0 Updaterc2
OpenttdOpenttd Version1.1.0 Updaterc3
OpenttdOpenttd Version1.1.1
OpenttdOpenttd Version1.1.1 Updaterc1
OpenttdOpenttd Version1.1.2 Updaterc1
OpenttdOpenttd Version1.1.2 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 5.21% 0.889
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.