CVE-2011-3342

Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
openttdopenttd
𝑥
≤ 1.1.2
openttdopenttd
0.1.1
openttdopenttd
0.1.2
openttdopenttd
0.1.3
openttdopenttd
0.1.4
openttdopenttd
0.2.0
openttdopenttd
0.2.1
openttdopenttd
0.3.0
openttdopenttd
0.3.1
openttdopenttd
0.3.2
openttdopenttd
0.3.2.1
openttdopenttd
0.3.3
openttdopenttd
0.3.4
openttdopenttd
0.3.5
openttdopenttd
0.3.6
openttdopenttd
0.3.7
openttdopenttd
0.4.0
openttdopenttd
0.4.0.1
openttdopenttd
0.4.5
openttdopenttd
0.4.6
openttdopenttd
0.4.7
openttdopenttd
0.4.8
openttdopenttd
0.4.8:rc1
openttdopenttd
0.4.8:rc2
openttdopenttd
0.5.0
openttdopenttd
0.5.0:rc1
openttdopenttd
0.5.0:rc2
openttdopenttd
0.5.0:rc3
openttdopenttd
0.5.0:rc4
openttdopenttd
0.5.0:rc5
openttdopenttd
0.5.1
openttdopenttd
0.5.1:rc1
openttdopenttd
0.5.1:rc2
openttdopenttd
0.5.1:rc3
openttdopenttd
0.5.2
openttdopenttd
0.5.2:rc1
openttdopenttd
0.5.3
openttdopenttd
0.5.3:rc1
openttdopenttd
0.5.3:rc2
openttdopenttd
0.5.3:rc3
openttdopenttd
0.6.0
openttdopenttd
0.6.0:beta1
openttdopenttd
0.6.0:beta2
openttdopenttd
0.6.0:beta3
openttdopenttd
0.6.0:beta4
openttdopenttd
0.6.0:beta5
openttdopenttd
0.6.0:rc1
openttdopenttd
0.6.1
openttdopenttd
0.6.1:rc1
openttdopenttd
0.6.1:rc2
openttdopenttd
0.6.2
openttdopenttd
0.6.2:rc1
openttdopenttd
0.6.2:rc2
openttdopenttd
0.6.3
openttdopenttd
0.6.3:rc1
openttdopenttd
0.7.0
openttdopenttd
0.7.0:beta1
openttdopenttd
0.7.0:beta2
openttdopenttd
0.7.0:rc1
openttdopenttd
0.7.0:rc2
openttdopenttd
0.7.1
openttdopenttd
0.7.1:rc1
openttdopenttd
0.7.1:rc2
openttdopenttd
0.7.1:rc3
openttdopenttd
0.7.2
openttdopenttd
0.7.2:rc1
openttdopenttd
0.7.2:rc2
openttdopenttd
0.7.3
openttdopenttd
0.7.3:rc1
openttdopenttd
0.7.3:rc2
openttdopenttd
0.7.4
openttdopenttd
0.7.4:rc1
openttdopenttd
0.7.5
openttdopenttd
0.7.5:rc1
openttdopenttd
1.0.0
openttdopenttd
1.0.0:beta1
openttdopenttd
1.0.0:beta2
openttdopenttd
1.0.0:beta3
openttdopenttd
1.0.0:beta4
openttdopenttd
1.0.0:rc1
openttdopenttd
1.0.0:rc2
openttdopenttd
1.0.0:rc3
openttdopenttd
1.0.1
openttdopenttd
1.0.1:rc1
openttdopenttd
1.0.1:rc2
openttdopenttd
1.0.2
openttdopenttd
1.0.2:rc1
openttdopenttd
1.0.3
openttdopenttd
1.0.3:rc1
openttdopenttd
1.0.4
openttdopenttd
1.0.4:rc1
openttdopenttd
1.0.5
openttdopenttd
1.0.5:rc1
openttdopenttd
1.0.5:rc2
openttdopenttd
1.1.0
openttdopenttd
1.1.0:beta1
openttdopenttd
1.1.0:beta2
openttdopenttd
1.1.0:beta3
openttdopenttd
1.1.0:beta4
openttdopenttd
1.1.0:beta5
openttdopenttd
1.1.0:rc1
openttdopenttd
1.1.0:rc2
openttdopenttd
1.1.0:rc3
openttdopenttd
1.1.1
openttdopenttd
1.1.1:rc1
openttdopenttd
1.1.2:rc1
openttdopenttd
1.1.2:rc2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openttd
bullseye
1.10.3-1
fixed
bookworm
13.0-2
fixed
sid
14.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openttd
saucy
not-affected
raring
not-affected
quantal
not-affected
precise
not-affected
oneiric
ignored
natty
ignored
maverick
ignored
lucid
ignored
hardy
ignored