Lucene search

K
gentooGentoo FoundationGLSA-200903-09
HistoryMar 07, 2009 - 12:00 a.m.

OpenTTD: Execution of arbitrary code

2009-03-0700:00:00
Gentoo Foundation
security.gentoo.org
9

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.089 Low

EPSS

Percentile

94.6%

Background

OpenTTD is a clone of Transport Tycoon Deluxe.

Description

Multiple buffer overflows have been reported in OpenTTD, when storing long for client names (CVE-2008-3547), in the TruncateString function in src/gfx.cpp (CVE-2008-3576) and in src/openttd.cpp when processing a large filename supplied to the “-g” parameter in the ttd_main function (CVE-2008-3577).

Impact

An authenticated attacker could exploit these vulnerabilities to execute arbitrary code with the privileges of the OpenTTD server.

Workaround

There is no known workaround at this time.

Resolution

All OpenTTD users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.6.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallgames-simulation/openttd< 0.6.3UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.089 Low

EPSS

Percentile

94.6%