CVE-2008-3577
10.08.2008, 21:41
Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.Enginsight
Vendor | Product | Version |
---|---|---|
openttd | openttd | 0.1.1 |
openttd | openttd | 0.1.2 |
openttd | openttd | 0.1.3 |
openttd | openttd | 0.1.4 |
openttd | openttd | 0.2.0 |
openttd | openttd | 0.2.1 |
openttd | openttd | 0.3.0 |
openttd | openttd | 0.3.1 |
openttd | openttd | 0.3.2 |
openttd | openttd | 0.3.2.1 |
openttd | openttd | 0.3.3 |
openttd | openttd | 0.3.4 |
openttd | openttd | 0.3.5 |
openttd | openttd | 0.3.6 |
openttd | openttd | 0.4.0 |
openttd | openttd | 0.4.0.1 |
openttd | openttd | 0.4.5 |
openttd | openttd | 0.4.6 |
openttd | openttd | 0.4.7 |
openttd | openttd | 0.4.8 |
openttd | openttd | 0.4.8:rc1 |
openttd | openttd | 0.4.8:rc2 |
openttd | openttd | 0.5.0 |
openttd | openttd | 0.5.0:rc1 |
openttd | openttd | 0.5.0:rc2 |
openttd | openttd | 0.5.0:rc3 |
openttd | openttd | 0.5.0:rc4 |
openttd | openttd | 0.5.0:rc5 |
openttd | openttd | 0.5.1 |
openttd | openttd | 0.5.1:rc1 |
openttd | openttd | 0.5.1:rc2 |
openttd | openttd | 0.5.1:rc3 |
openttd | openttd | 0.5.2 |
openttd | openttd | 0.5.2:rc1 |
openttd | openttd | 0.5.3 |
openttd | openttd | 0.5.3:rc1 |
openttd | openttd | 0.5.3:rc2 |
openttd | openttd | 0.5.3:rc3 |
openttd | openttd | 0.6.0 |
openttd | openttd | 0.6.0:beta1 |
openttd | openttd | 0.6.0:beta2 |
openttd | openttd | 0.6.0:beta3 |
openttd | openttd | 0.6.0:beta4 |
openttd | openttd | 0.6.0:beta5 |
openttd | openttd | 0.6.0:rc1 |
openttd | openttd | 0.6.1 |
openttd | openttd | 0.6.1:rc1 |
openttd | openttd | 0.6.1:rc2 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References