Buffer overflow in OpenTTD server allows remote code execution via long name
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | CVE-2008-3547 | 10 Mar 200900:00 | – | ubuntucve |
![]() | CVE-2008-3547 | 10 Mar 200921:30 | – | osv |
![]() | CVE-2008-3547 | 10 Mar 200921:00 | – | cvelist |
![]() | CVE-2008-3547 | 10 Mar 200921:30 | – | cve |
![]() | CVE-2008-3547 | 10 Mar 200921:30 | – | nvd |
![]() | Buffer overflow | 10 Mar 200921:30 | – | prion |
![]() | GLSA-200903-09 : OpenTTD: Execution of arbitrary code | 8 Mar 200900:00 | – | nessus |
![]() | OpenTTD: Execution of arbitrary code | 7 Mar 200900:00 | – | gentoo |
![]() | Gentoo Security Advisory GLSA 200903-09 (openttd) | 13 Mar 200900:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200903-09 (openttd) | 13 Mar 200900:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | openttd | 0.6.2-1 | openttd_0.6.2-1_all.deb |
Debian | 11 | all | openttd | 0.6.2-1 | openttd_0.6.2-1_all.deb |
Debian | 999 | all | openttd | 0.6.2-1 | openttd_0.6.2-1_all.deb |
Debian | 13 | all | openttd | 0.6.2-1 | openttd_0.6.2-1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo