diff options
author | Dmitry Marakasov <amdmi3@FreeBSD.org> | 2011-10-16 18:39:44 +0000 |
---|---|---|
committer | Dmitry Marakasov <amdmi3@FreeBSD.org> | 2011-10-16 18:39:44 +0000 |
commit | c93d47cb0371f0d4b24bdb73717190fbb88b66bf (patch) | |
tree | 1850a8e2b9f89aad22dda67e920660bccf022616 | |
parent | 167a84d661fb07c945ae0dcf16e473878bd4512b (diff) |
Document openttd multiple vulnerabilities
PR: 161488
Submitted by: "Ilya A. Arkhipov" <micro@heavennet.ru>
Notes
Notes:
svn path=/head/; revision=283613
-rw-r--r-- | security/vuxml/vuln.xml | 83 |
1 files changed, 83 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ee976969d471..e460cb7c08a5 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,89 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="9bad5ab1-f3f6-11e0-8b5c-b482fe3f522d"> + <topic>OpenTTD -- Multiple buffer overflows in validation of external data</topic> + <affects> + <package> + <name>openttd</name> + <range><ge>0.1.0</ge><lt>1.1.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenTTD Team reports:</p> + <blockquote cite="http://security.openttd.org/en/CVE-2011-3343"> + <p>Multiple buffer overflows in OpenTTD before 1.1.3 allow + local users to cause a denial of service (daemon crash) or + possibly gain privileges via (1) a crafted BMP file with RLE + compression or (2) crafted dimensions in a BMP file.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-3343</cvename> + <url>http://security.openttd.org/en/CVE-2011-3343</url> + </references> + <dates> + <discovery>2011-08-25</discovery> + <entry>2011-09-02</entry> + </dates> + </vuln> + <vuln vid="78c25ed7-f3f9-11e0-8b5c-b482fe3f522d"> + <topic>OpenTTD -- Buffer overflows in savegame loading</topic> + <affects> + <package> + <name>openttd</name> + <range><ge>0.1.0</ge><lt>1.1.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenTTD Team reports:</p> + <blockquote cite="http://security.openttd.org/en/CVE-2011-3342"> + <p>Multiple buffer overflows in OpenTTD before 1.1.3 allow remote + attackers to cause a denial of service (daemon crash) or possibly + execute arbitrary code via vectors related to (1) NAME, (2) PLYR, + (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-3342</cvename> + <url>http://security.openttd.org/en/CVE-2011-3342</url> + </references> + <dates> + <discovery>2011-08-08</discovery> + <entry>2011-08-25</entry> + </dates> + </vuln> + <vuln vid="e77befb5-f3f9-11e0-8b5c-b482fe3f522d"> + <topic>OpenTTD -- Denial of service via improperly validated commands</topic> + <affects> + <package> + <name>openttd</name> + <range><ge>0.3.5</ge><lt>1.1.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenTTD Team reports:</p> + <blockquote cite="http://security.openttd.org/en/CVE-2011-3341"> + <p>Multiple off-by-one errors in order_cmd.cpp in OpenTTD before + 1.1.3 allow remote attackers to cause a denial of service (daemon crash) + or possibly execute arbitrary code via a crafted CMD_INSERT_ORDER command.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-3341</cvename> + <url>http://security.openttd.org/en/CVE-2011-3341</url> + </references> + <dates> + <discovery>2011-08-25</discovery> + <entry>2011-08-26</entry> + </dates> + </vuln> <vuln vid="ab9be2c8-ef91-11e0-ad5a-00215c6a37bb"> <topic>quagga -- multiple vulnerabilities</topic> <affects> |