CVE-2008-3577

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function.  NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 24%
VendorProductVersion
openttdopenttd
0.1.1
openttdopenttd
0.1.2
openttdopenttd
0.1.3
openttdopenttd
0.1.4
openttdopenttd
0.2.0
openttdopenttd
0.2.1
openttdopenttd
0.3.0
openttdopenttd
0.3.1
openttdopenttd
0.3.2
openttdopenttd
0.3.2.1
openttdopenttd
0.3.3
openttdopenttd
0.3.4
openttdopenttd
0.3.5
openttdopenttd
0.3.6
openttdopenttd
0.4.0
openttdopenttd
0.4.0.1
openttdopenttd
0.4.5
openttdopenttd
0.4.6
openttdopenttd
0.4.7
openttdopenttd
0.4.8
openttdopenttd
0.4.8:rc1
openttdopenttd
0.4.8:rc2
openttdopenttd
0.5.0
openttdopenttd
0.5.0:rc1
openttdopenttd
0.5.0:rc2
openttdopenttd
0.5.0:rc3
openttdopenttd
0.5.0:rc4
openttdopenttd
0.5.0:rc5
openttdopenttd
0.5.1
openttdopenttd
0.5.1:rc1
openttdopenttd
0.5.1:rc2
openttdopenttd
0.5.1:rc3
openttdopenttd
0.5.2
openttdopenttd
0.5.2:rc1
openttdopenttd
0.5.3
openttdopenttd
0.5.3:rc1
openttdopenttd
0.5.3:rc2
openttdopenttd
0.5.3:rc3
openttdopenttd
0.6.0
openttdopenttd
0.6.0:beta1
openttdopenttd
0.6.0:beta2
openttdopenttd
0.6.0:beta3
openttdopenttd
0.6.0:beta4
openttdopenttd
0.6.0:beta5
openttdopenttd
0.6.0:rc1
openttdopenttd
0.6.1
openttdopenttd
0.6.1:rc1
openttdopenttd
0.6.1:rc2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openttd
bullseye
1.10.3-1
fixed
bookworm
13.0-2
fixed
sid
14.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openttd
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
not-affected
karmic
not-affected
jaunty
not-affected
intrepid
not-affected
hardy
ignored
gutsy
ignored
feisty
dne
dapper
dne