4.6

CVE-2011-3343

Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpenttdOpenttd Version <= 1.1.2
OpenttdOpenttd Version0.1.1
OpenttdOpenttd Version0.1.2
OpenttdOpenttd Version0.1.3
OpenttdOpenttd Version0.1.4
OpenttdOpenttd Version0.2.0
OpenttdOpenttd Version0.2.1
OpenttdOpenttd Version0.3.0
OpenttdOpenttd Version0.3.1
OpenttdOpenttd Version0.3.2
OpenttdOpenttd Version0.3.2.1
OpenttdOpenttd Version0.3.3
OpenttdOpenttd Version0.3.4
OpenttdOpenttd Version0.3.5
OpenttdOpenttd Version0.3.6
OpenttdOpenttd Version0.3.7
OpenttdOpenttd Version0.4.0
OpenttdOpenttd Version0.4.0.1
OpenttdOpenttd Version0.4.5
OpenttdOpenttd Version0.4.6
OpenttdOpenttd Version0.4.7
OpenttdOpenttd Version0.4.8
OpenttdOpenttd Version0.4.8 Updaterc1
OpenttdOpenttd Version0.4.8 Updaterc2
OpenttdOpenttd Version0.5.0
OpenttdOpenttd Version0.5.0 Updaterc1
OpenttdOpenttd Version0.5.0 Updaterc2
OpenttdOpenttd Version0.5.0 Updaterc3
OpenttdOpenttd Version0.5.0 Updaterc4
OpenttdOpenttd Version0.5.0 Updaterc5
OpenttdOpenttd Version0.5.1
OpenttdOpenttd Version0.5.1 Updaterc1
OpenttdOpenttd Version0.5.1 Updaterc2
OpenttdOpenttd Version0.5.1 Updaterc3
OpenttdOpenttd Version0.5.2
OpenttdOpenttd Version0.5.2 Updaterc1
OpenttdOpenttd Version0.5.3
OpenttdOpenttd Version0.5.3 Updaterc1
OpenttdOpenttd Version0.5.3 Updaterc2
OpenttdOpenttd Version0.5.3 Updaterc3
OpenttdOpenttd Version0.6.0
OpenttdOpenttd Version0.6.0 Updatebeta1
OpenttdOpenttd Version0.6.0 Updatebeta2
OpenttdOpenttd Version0.6.0 Updatebeta3
OpenttdOpenttd Version0.6.0 Updatebeta4
OpenttdOpenttd Version0.6.0 Updatebeta5
OpenttdOpenttd Version0.6.0 Updaterc1
OpenttdOpenttd Version0.6.1
OpenttdOpenttd Version0.6.1 Updaterc1
OpenttdOpenttd Version0.6.1 Updaterc2
OpenttdOpenttd Version0.6.2
OpenttdOpenttd Version0.6.2 Updaterc1
OpenttdOpenttd Version0.6.2 Updaterc2
OpenttdOpenttd Version0.6.3
OpenttdOpenttd Version0.6.3 Updaterc1
OpenttdOpenttd Version0.7.0
OpenttdOpenttd Version0.7.0 Updatebeta1
OpenttdOpenttd Version0.7.0 Updatebeta2
OpenttdOpenttd Version0.7.0 Updaterc1
OpenttdOpenttd Version0.7.0 Updaterc2
OpenttdOpenttd Version0.7.1
OpenttdOpenttd Version0.7.1 Updaterc1
OpenttdOpenttd Version0.7.1 Updaterc2
OpenttdOpenttd Version0.7.1 Updaterc3
OpenttdOpenttd Version0.7.2
OpenttdOpenttd Version0.7.2 Updaterc1
OpenttdOpenttd Version0.7.2 Updaterc2
OpenttdOpenttd Version0.7.3
OpenttdOpenttd Version0.7.3 Updaterc1
OpenttdOpenttd Version0.7.3 Updaterc2
OpenttdOpenttd Version0.7.4
OpenttdOpenttd Version0.7.4 Updaterc1
OpenttdOpenttd Version0.7.5
OpenttdOpenttd Version0.7.5 Updaterc1
OpenttdOpenttd Version1.0.0
OpenttdOpenttd Version1.0.0 Updatebeta1
OpenttdOpenttd Version1.0.0 Updatebeta2
OpenttdOpenttd Version1.0.0 Updatebeta3
OpenttdOpenttd Version1.0.0 Updatebeta4
OpenttdOpenttd Version1.0.0 Updaterc1
OpenttdOpenttd Version1.0.0 Updaterc2
OpenttdOpenttd Version1.0.0 Updaterc3
OpenttdOpenttd Version1.0.1
OpenttdOpenttd Version1.0.1 Updaterc1
OpenttdOpenttd Version1.0.1 Updaterc2
OpenttdOpenttd Version1.0.2
OpenttdOpenttd Version1.0.2 Updaterc1
OpenttdOpenttd Version1.0.3
OpenttdOpenttd Version1.0.3 Updaterc1
OpenttdOpenttd Version1.0.4
OpenttdOpenttd Version1.0.4 Updaterc1
OpenttdOpenttd Version1.0.5
OpenttdOpenttd Version1.0.5 Updaterc1
OpenttdOpenttd Version1.0.5 Updaterc2
OpenttdOpenttd Version1.1.0
OpenttdOpenttd Version1.1.0 Updatebeta1
OpenttdOpenttd Version1.1.0 Updatebeta2
OpenttdOpenttd Version1.1.0 Updatebeta3
OpenttdOpenttd Version1.1.0 Updatebeta4
OpenttdOpenttd Version1.1.0 Updatebeta5
OpenttdOpenttd Version1.1.0 Updaterc1
OpenttdOpenttd Version1.1.0 Updaterc2
OpenttdOpenttd Version1.1.0 Updaterc3
OpenttdOpenttd Version1.1.1
OpenttdOpenttd Version1.1.1 Updaterc1
OpenttdOpenttd Version1.1.2 Updaterc1
OpenttdOpenttd Version1.1.2 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.157
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.6 3.9 6.4
AV:L/AC:L/Au:N/C:P/I:P/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.