diff options
author | Alexey Dokuchaev <danfe@FreeBSD.org> | 2012-01-17 08:31:38 +0000 |
---|---|---|
committer | Alexey Dokuchaev <danfe@FreeBSD.org> | 2012-01-17 08:31:38 +0000 |
commit | c461abab60d3c89dee303297b0b165f7f861d4dc (patch) | |
tree | 815b03775245411c068b9e4f5977befb65723e32 /security | |
parent | 2555b49659f5bcd7114408a5270f95799ae95959 (diff) | |
download | ports-c461abab60d3c89dee303297b0b165f7f861d4dc.tar.gz ports-c461abab60d3c89dee303297b0b165f7f861d4dc.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f1fa5b40fd28..2baa7e5c524d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,40 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1ac858b0-3fae-11e1-a127-0013d3ccd9df"> + <topic>OpenTTD -- Denial of service (server) via slow read attack</topic> + <affects> + <package> + <name>openttd</name> + <range><ge>0.3.5</ge><lt>1.1.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenTTD Team reports:</p> + <blockquote cite="http://security.openttd.org/en/CVE-2012-0049"> + <p>Using a slow read type attack it is possible to prevent anyone + from joining a server with virtually no resources. Once downloading + the map no other downloads of the map can start, so downloading + really slowly will prevent others from joining. This can be further + aggravated by the pause-on-join setting in which case the game is + paused and the players cannot continue the game during such an + attack. This attack requires that the user is not banned and passes + the authorization to the server, although for many servers there is + no server password and thus authorization is easy.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-0049</cvename> + <url>http://security.openttd.org/en/CVE-2011-3343</url> + </references> + <dates> + <discovery>2012-01-06</discovery> + <entry>2012-01-16</entry> + </dates> + </vuln> + <vuln vid="91be81e7-3fea-11e1-afc7-2c4138874f7d"> <topic>Multiple implementations denial-of-service via hash algorithm collision</topic> <affects> |