CVE-2010-2534

The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
openttdopenttd
0.1.1
openttdopenttd
0.1.2
openttdopenttd
0.1.3
openttdopenttd
0.1.4
openttdopenttd
0.2.0
openttdopenttd
0.2.1
openttdopenttd
0.3.0
openttdopenttd
0.3.1
openttdopenttd
0.3.2
openttdopenttd
0.3.2.1
openttdopenttd
0.3.3
openttdopenttd
0.3.4
openttdopenttd
0.3.5
openttdopenttd
0.3.6
openttdopenttd
0.3.7
openttdopenttd
0.4.0
openttdopenttd
0.4.0.1
openttdopenttd
0.4.5
openttdopenttd
0.4.6
openttdopenttd
0.4.7
openttdopenttd
0.4.8
openttdopenttd
0.4.8:rc1
openttdopenttd
0.4.8:rc2
openttdopenttd
0.5.0
openttdopenttd
0.5.0:rc1
openttdopenttd
0.5.0:rc2
openttdopenttd
0.5.0:rc3
openttdopenttd
0.5.0:rc4
openttdopenttd
0.5.0:rc5
openttdopenttd
0.5.1
openttdopenttd
0.5.1:rc1
openttdopenttd
0.5.1:rc2
openttdopenttd
0.5.1:rc3
openttdopenttd
0.5.2
openttdopenttd
0.5.2:rc1
openttdopenttd
0.5.3
openttdopenttd
0.5.3:rc1
openttdopenttd
0.5.3:rc2
openttdopenttd
0.5.3:rc3
openttdopenttd
0.6.0
openttdopenttd
0.6.0:beta1
openttdopenttd
0.6.0:beta2
openttdopenttd
0.6.0:beta3
openttdopenttd
0.6.0:beta4
openttdopenttd
0.6.0:beta5
openttdopenttd
0.6.0:rc1
openttdopenttd
0.6.1
openttdopenttd
0.6.1:rc1
openttdopenttd
0.6.1:rc2
openttdopenttd
0.6.2
openttdopenttd
0.6.2:rc1
openttdopenttd
0.6.2:rc2
openttdopenttd
0.6.3
openttdopenttd
0.6.3:rc1
openttdopenttd
0.7.0
openttdopenttd
0.7.0:beta1
openttdopenttd
0.7.0:beta2
openttdopenttd
0.7.0:rc1
openttdopenttd
0.7.0:rc2
openttdopenttd
0.7.1
openttdopenttd
0.7.1:rc1
openttdopenttd
0.7.1:rc2
openttdopenttd
0.7.1:rc3
openttdopenttd
0.7.2
openttdopenttd
0.7.2:rc1
openttdopenttd
0.7.2:rc2
openttdopenttd
0.7.3
openttdopenttd
0.7.3:rc1
openttdopenttd
0.7.3:rc2
openttdopenttd
0.7.4
openttdopenttd
0.7.4:rc1
openttdopenttd
0.7.5
openttdopenttd
0.7.5:rc1
openttdopenttd
1.0.0
openttdopenttd
1.0.0:beta1
openttdopenttd
1.0.0:beta2
openttdopenttd
1.0.0:beta3
openttdopenttd
1.0.0:beta4
openttdopenttd
1.0.0:rc1
openttdopenttd
1.0.0:rc2
openttdopenttd
1.0.0:rc3
openttdopenttd
1.0.1
openttdopenttd
1.0.1:rc1
openttdopenttd
1.0.1:rc2
openttdopenttd
1.0.2
openttdopenttd
1.0.2:rc1
openttdopenttd
1.0.3:rc1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openttd
bullseye
1.10.3-1
fixed
lenny
not-affected
bookworm
13.0-2
fixed
sid
14.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openttd
lucid
not-affected
karmic
not-affected
jaunty
not-affected
hardy
not-affected
dapper
dne
Common Weakness Enumeration