CVE-2011-3343

EUVD-2011-3307
Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 18%
Affected Products (NVD)
VendorProductVersion
openttdopenttd
𝑥
≤ 1.1.2
openttdopenttd
0.1.1
openttdopenttd
0.1.2
openttdopenttd
0.1.3
openttdopenttd
0.1.4
openttdopenttd
0.2.0
openttdopenttd
0.2.1
openttdopenttd
0.3.0
openttdopenttd
0.3.1
openttdopenttd
0.3.2
openttdopenttd
0.3.2.1
openttdopenttd
0.3.3
openttdopenttd
0.3.4
openttdopenttd
0.3.5
openttdopenttd
0.3.6
openttdopenttd
0.3.7
openttdopenttd
0.4.0
openttdopenttd
0.4.0.1
openttdopenttd
0.4.5
openttdopenttd
0.4.6
openttdopenttd
0.4.7
openttdopenttd
0.4.8
openttdopenttd
0.4.8:rc1
openttdopenttd
0.4.8:rc2
openttdopenttd
0.5.0
openttdopenttd
0.5.0:rc1
openttdopenttd
0.5.0:rc2
openttdopenttd
0.5.0:rc3
openttdopenttd
0.5.0:rc4
openttdopenttd
0.5.0:rc5
openttdopenttd
0.5.1
openttdopenttd
0.5.1:rc1
openttdopenttd
0.5.1:rc2
openttdopenttd
0.5.1:rc3
openttdopenttd
0.5.2
openttdopenttd
0.5.2:rc1
openttdopenttd
0.5.3
openttdopenttd
0.5.3:rc1
openttdopenttd
0.5.3:rc2
openttdopenttd
0.5.3:rc3
openttdopenttd
0.6.0
openttdopenttd
0.6.0:beta1
openttdopenttd
0.6.0:beta2
openttdopenttd
0.6.0:beta3
openttdopenttd
0.6.0:beta4
openttdopenttd
0.6.0:beta5
openttdopenttd
0.6.0:rc1
openttdopenttd
0.6.1
openttdopenttd
0.6.1:rc1
openttdopenttd
0.6.1:rc2
openttdopenttd
0.6.2
openttdopenttd
0.6.2:rc1
openttdopenttd
0.6.2:rc2
openttdopenttd
0.6.3
openttdopenttd
0.6.3:rc1
openttdopenttd
0.7.0
openttdopenttd
0.7.0:beta1
openttdopenttd
0.7.0:beta2
openttdopenttd
0.7.0:rc1
openttdopenttd
0.7.0:rc2
openttdopenttd
0.7.1
openttdopenttd
0.7.1:rc1
openttdopenttd
0.7.1:rc2
openttdopenttd
0.7.1:rc3
openttdopenttd
0.7.2
openttdopenttd
0.7.2:rc1
openttdopenttd
0.7.2:rc2
openttdopenttd
0.7.3
openttdopenttd
0.7.3:rc1
openttdopenttd
0.7.3:rc2
openttdopenttd
0.7.4
openttdopenttd
0.7.4:rc1
openttdopenttd
0.7.5
openttdopenttd
0.7.5:rc1
openttdopenttd
1.0.0
openttdopenttd
1.0.0:beta1
openttdopenttd
1.0.0:beta2
openttdopenttd
1.0.0:beta3
openttdopenttd
1.0.0:beta4
openttdopenttd
1.0.0:rc1
openttdopenttd
1.0.0:rc2
openttdopenttd
1.0.0:rc3
openttdopenttd
1.0.1
openttdopenttd
1.0.1:rc1
openttdopenttd
1.0.1:rc2
openttdopenttd
1.0.2
openttdopenttd
1.0.2:rc1
openttdopenttd
1.0.3
openttdopenttd
1.0.3:rc1
openttdopenttd
1.0.4
openttdopenttd
1.0.4:rc1
openttdopenttd
1.0.5
openttdopenttd
1.0.5:rc1
openttdopenttd
1.0.5:rc2
openttdopenttd
1.1.0
openttdopenttd
1.1.0:beta1
openttdopenttd
1.1.0:beta2
openttdopenttd
1.1.0:beta3
openttdopenttd
1.1.0:beta4
openttdopenttd
1.1.0:beta5
openttdopenttd
1.1.0:rc1
openttdopenttd
1.1.0:rc2
openttdopenttd
1.1.0:rc3
openttdopenttd
1.1.1
openttdopenttd
1.1.1:rc1
openttdopenttd
1.1.2:rc1
openttdopenttd
1.1.2:rc2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openttd
bookworm
13.0-2
fixed
bullseye
1.10.3-1
fixed
sid
14.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openttd
hardy
ignored
lucid
ignored
maverick
ignored
natty
ignored
oneiric
ignored
precise
not-affected
quantal
not-affected
raring
not-affected
saucy
not-affected