CVE-2011-3343

Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 19%
VendorProductVersion
openttdopenttd
𝑥
≤ 1.1.2
openttdopenttd
0.1.1
openttdopenttd
0.1.2
openttdopenttd
0.1.3
openttdopenttd
0.1.4
openttdopenttd
0.2.0
openttdopenttd
0.2.1
openttdopenttd
0.3.0
openttdopenttd
0.3.1
openttdopenttd
0.3.2
openttdopenttd
0.3.2.1
openttdopenttd
0.3.3
openttdopenttd
0.3.4
openttdopenttd
0.3.5
openttdopenttd
0.3.6
openttdopenttd
0.3.7
openttdopenttd
0.4.0
openttdopenttd
0.4.0.1
openttdopenttd
0.4.5
openttdopenttd
0.4.6
openttdopenttd
0.4.7
openttdopenttd
0.4.8
openttdopenttd
0.4.8:rc1
openttdopenttd
0.4.8:rc2
openttdopenttd
0.5.0
openttdopenttd
0.5.0:rc1
openttdopenttd
0.5.0:rc2
openttdopenttd
0.5.0:rc3
openttdopenttd
0.5.0:rc4
openttdopenttd
0.5.0:rc5
openttdopenttd
0.5.1
openttdopenttd
0.5.1:rc1
openttdopenttd
0.5.1:rc2
openttdopenttd
0.5.1:rc3
openttdopenttd
0.5.2
openttdopenttd
0.5.2:rc1
openttdopenttd
0.5.3
openttdopenttd
0.5.3:rc1
openttdopenttd
0.5.3:rc2
openttdopenttd
0.5.3:rc3
openttdopenttd
0.6.0
openttdopenttd
0.6.0:beta1
openttdopenttd
0.6.0:beta2
openttdopenttd
0.6.0:beta3
openttdopenttd
0.6.0:beta4
openttdopenttd
0.6.0:beta5
openttdopenttd
0.6.0:rc1
openttdopenttd
0.6.1
openttdopenttd
0.6.1:rc1
openttdopenttd
0.6.1:rc2
openttdopenttd
0.6.2
openttdopenttd
0.6.2:rc1
openttdopenttd
0.6.2:rc2
openttdopenttd
0.6.3
openttdopenttd
0.6.3:rc1
openttdopenttd
0.7.0
openttdopenttd
0.7.0:beta1
openttdopenttd
0.7.0:beta2
openttdopenttd
0.7.0:rc1
openttdopenttd
0.7.0:rc2
openttdopenttd
0.7.1
openttdopenttd
0.7.1:rc1
openttdopenttd
0.7.1:rc2
openttdopenttd
0.7.1:rc3
openttdopenttd
0.7.2
openttdopenttd
0.7.2:rc1
openttdopenttd
0.7.2:rc2
openttdopenttd
0.7.3
openttdopenttd
0.7.3:rc1
openttdopenttd
0.7.3:rc2
openttdopenttd
0.7.4
openttdopenttd
0.7.4:rc1
openttdopenttd
0.7.5
openttdopenttd
0.7.5:rc1
openttdopenttd
1.0.0
openttdopenttd
1.0.0:beta1
openttdopenttd
1.0.0:beta2
openttdopenttd
1.0.0:beta3
openttdopenttd
1.0.0:beta4
openttdopenttd
1.0.0:rc1
openttdopenttd
1.0.0:rc2
openttdopenttd
1.0.0:rc3
openttdopenttd
1.0.1
openttdopenttd
1.0.1:rc1
openttdopenttd
1.0.1:rc2
openttdopenttd
1.0.2
openttdopenttd
1.0.2:rc1
openttdopenttd
1.0.3
openttdopenttd
1.0.3:rc1
openttdopenttd
1.0.4
openttdopenttd
1.0.4:rc1
openttdopenttd
1.0.5
openttdopenttd
1.0.5:rc1
openttdopenttd
1.0.5:rc2
openttdopenttd
1.1.0
openttdopenttd
1.1.0:beta1
openttdopenttd
1.1.0:beta2
openttdopenttd
1.1.0:beta3
openttdopenttd
1.1.0:beta4
openttdopenttd
1.1.0:beta5
openttdopenttd
1.1.0:rc1
openttdopenttd
1.1.0:rc2
openttdopenttd
1.1.0:rc3
openttdopenttd
1.1.1
openttdopenttd
1.1.1:rc1
openttdopenttd
1.1.2:rc1
openttdopenttd
1.1.2:rc2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openttd
bullseye
1.10.3-1
fixed
bookworm
13.0-2
fixed
sid
14.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openttd
saucy
not-affected
raring
not-affected
quantal
not-affected
precise
not-affected
oneiric
ignored
natty
ignored
maverick
ignored
lucid
ignored
hardy
ignored