CVE-2009-0878
12.03.2009, 15:20
The read_game_map function in src/terrain_translation.cpp in Wesnoth before r32987 allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a map with a large (1) width or (2) height.Enginsight
Vendor | Product | Version |
---|---|---|
wesnoth | wesnoth | 𝑥 ≤ 1.4.7 |
wesnoth | wesnoth | 0.2.1 |
wesnoth | wesnoth | 0.3 |
wesnoth | wesnoth | 0.3.1 |
wesnoth | wesnoth | 0.3.2 |
wesnoth | wesnoth | 0.3.3 |
wesnoth | wesnoth | 0.3.4 |
wesnoth | wesnoth | 0.4 |
wesnoth | wesnoth | 0.4.1 |
wesnoth | wesnoth | 0.4.2 |
wesnoth | wesnoth | 0.4.3 |
wesnoth | wesnoth | 0.4.4 |
wesnoth | wesnoth | 0.4.5 |
wesnoth | wesnoth | 0.4.6 |
wesnoth | wesnoth | 0.4.7 |
wesnoth | wesnoth | 0.4.8 |
wesnoth | wesnoth | 0.5 |
wesnoth | wesnoth | 0.5.1 |
wesnoth | wesnoth | 0.6 |
wesnoth | wesnoth | 0.6.1 |
wesnoth | wesnoth | 0.6.99.1 |
wesnoth | wesnoth | 0.6.99.2 |
wesnoth | wesnoth | 0.6.99.3 |
wesnoth | wesnoth | 0.6.99.4 |
wesnoth | wesnoth | 0.6.99.5 |
wesnoth | wesnoth | 0.7 |
wesnoth | wesnoth | 0.7.1 |
wesnoth | wesnoth | 0.7.2 |
wesnoth | wesnoth | 0.7.3 |
wesnoth | wesnoth | 0.7.4 |
wesnoth | wesnoth | 0.7.5 |
wesnoth | wesnoth | 0.7.6 |
wesnoth | wesnoth | 0.7.7 |
wesnoth | wesnoth | 0.7.8 |
wesnoth | wesnoth | 0.7.9 |
wesnoth | wesnoth | 0.7.10 |
wesnoth | wesnoth | 0.7.11 |
wesnoth | wesnoth | 0.8 |
wesnoth | wesnoth | 0.8.1 |
wesnoth | wesnoth | 0.8.2 |
wesnoth | wesnoth | 0.8.3 |
wesnoth | wesnoth | 0.8.4 |
wesnoth | wesnoth | 0.8.5 |
wesnoth | wesnoth | 0.8.6 |
wesnoth | wesnoth | 0.8.7 |
wesnoth | wesnoth | 0.8.8 |
wesnoth | wesnoth | 0.8.9 |
wesnoth | wesnoth | 0.8.10 |
wesnoth | wesnoth | 0.8.11 |
wesnoth | wesnoth | 0.9.0 |
wesnoth | wesnoth | 0.9.1 |
wesnoth | wesnoth | 0.9.2 |
wesnoth | wesnoth | 0.9.3 |
wesnoth | wesnoth | 0.9.4 |
wesnoth | wesnoth | 0.9.5 |
wesnoth | wesnoth | 0.9.6 |
wesnoth | wesnoth | 0.9.7 |
wesnoth | wesnoth | 1.0:rc |
wesnoth | wesnoth | 1.0rcl:rcl |
wesnoth | wesnoth | 1.1 |
wesnoth | wesnoth | 1.1.1 |
wesnoth | wesnoth | 1.1.2 |
wesnoth | wesnoth | 1.1.3 |
wesnoth | wesnoth | 1.1.4 |
wesnoth | wesnoth | 1.1.5 |
wesnoth | wesnoth | 1.1.6 |
wesnoth | wesnoth | 1.1.7 |
wesnoth | wesnoth | 1.1.8 |
wesnoth | wesnoth | 1.1.9 |
wesnoth | wesnoth | 1.1.10 |
wesnoth | wesnoth | 1.1.11 |
wesnoth | wesnoth | 1.1.12 |
wesnoth | wesnoth | 1.1.13 |
wesnoth | wesnoth | 1.1.14 |
wesnoth | wesnoth | 1.2 |
wesnoth | wesnoth | 1.2.1 |
wesnoth | wesnoth | 1.2.2 |
wesnoth | wesnoth | 1.2.3 |
wesnoth | wesnoth | 1.2.4 |
wesnoth | wesnoth | 1.2.5 |
wesnoth | wesnoth | 1.2.6 |
wesnoth | wesnoth | 1.2.7 |
wesnoth | wesnoth | 1.2.8 |
wesnoth | wesnoth | 1.3.1 |
wesnoth | wesnoth | 1.3.2 |
wesnoth | wesnoth | 1.3.3 |
wesnoth | wesnoth | 1.3.4 |
wesnoth | wesnoth | 1.3.5 |
wesnoth | wesnoth | 1.3.6 |
wesnoth | wesnoth | 1.3.7 |
wesnoth | wesnoth | 1.3.8 |
wesnoth | wesnoth | 1.3.9 |
wesnoth | wesnoth | 1.3.10 |
wesnoth | wesnoth | 1.3.11 |
wesnoth | wesnoth | 1.3.12 |
wesnoth | wesnoth | 1.3.13 |
wesnoth | wesnoth | 1.3.14 |
wesnoth | wesnoth | 1.3.15 |
wesnoth | wesnoth | 1.3.16 |
wesnoth | wesnoth | 1.3.17 |
wesnoth | wesnoth | 1.3.18 |
wesnoth | wesnoth | 1.3.19 |
wesnoth | wesnoth | 1.4 |
wesnoth | wesnoth | 1.4.1 |
wesnoth | wesnoth | 1.4.2 |
wesnoth | wesnoth | 1.4.3 |
wesnoth | wesnoth | 1.4.4 |
wesnoth | wesnoth | 1.4.5 |
wesnoth | wesnoth | 1.4.6 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References