CVE-2012-0048
25.08.2012, 10:29
OpenTTD 0.3.5 through 1.1.4 allows remote attackers to cause a denial of service (game pause) by connecting to the server and not finishing the (1) authorization phase or (2) map download, aka a "slow read" attack.Enginsight
Vendor | Product | Version |
---|---|---|
openttd | openttd | 0.3.5 |
openttd | openttd | 0.3.6 |
openttd | openttd | 0.3.7 |
openttd | openttd | 0.4.0 |
openttd | openttd | 0.4.0.1 |
openttd | openttd | 0.4.5 |
openttd | openttd | 0.4.6 |
openttd | openttd | 0.4.7 |
openttd | openttd | 0.4.8 |
openttd | openttd | 0.4.8:rc1 |
openttd | openttd | 0.4.8:rc2 |
openttd | openttd | 0.5.0 |
openttd | openttd | 0.5.0:rc1 |
openttd | openttd | 0.5.0:rc2 |
openttd | openttd | 0.5.0:rc3 |
openttd | openttd | 0.5.0:rc4 |
openttd | openttd | 0.5.0:rc5 |
openttd | openttd | 0.5.1 |
openttd | openttd | 0.5.1:rc1 |
openttd | openttd | 0.5.1:rc2 |
openttd | openttd | 0.5.1:rc3 |
openttd | openttd | 0.5.2 |
openttd | openttd | 0.5.2:rc1 |
openttd | openttd | 0.5.3 |
openttd | openttd | 0.5.3:rc1 |
openttd | openttd | 0.5.3:rc2 |
openttd | openttd | 0.5.3:rc3 |
openttd | openttd | 0.6.0 |
openttd | openttd | 0.6.0:beta1 |
openttd | openttd | 0.6.0:beta2 |
openttd | openttd | 0.6.0:beta3 |
openttd | openttd | 0.6.0:beta4 |
openttd | openttd | 0.6.0:beta5 |
openttd | openttd | 0.6.0:rc1 |
openttd | openttd | 0.6.1 |
openttd | openttd | 0.6.1:rc1 |
openttd | openttd | 0.6.1:rc2 |
openttd | openttd | 0.6.2 |
openttd | openttd | 0.6.2:rc1 |
openttd | openttd | 0.6.2:rc2 |
openttd | openttd | 0.6.2-rc1 |
openttd | openttd | 0.6.2-rc2 |
openttd | openttd | 0.6.3 |
openttd | openttd | 0.6.3:rc1 |
openttd | openttd | 0.7.0 |
openttd | openttd | 0.7.0:beta1 |
openttd | openttd | 0.7.0:beta2 |
openttd | openttd | 0.7.0:rc1 |
openttd | openttd | 0.7.0:rc2 |
openttd | openttd | 0.7.1 |
openttd | openttd | 0.7.1:rc1 |
openttd | openttd | 0.7.1:rc2 |
openttd | openttd | 0.7.1:rc3 |
openttd | openttd | 0.7.2 |
openttd | openttd | 0.7.2:rc1 |
openttd | openttd | 0.7.2:rc2 |
openttd | openttd | 0.7.3 |
openttd | openttd | 0.7.3:rc1 |
openttd | openttd | 0.7.3:rc2 |
openttd | openttd | 0.7.4 |
openttd | openttd | 0.7.4:rc1 |
openttd | openttd | 0.7.5 |
openttd | openttd | 0.7.5:rc1 |
openttd | openttd | 1.0.0 |
openttd | openttd | 1.0.0:beta1 |
openttd | openttd | 1.0.0:beta2 |
openttd | openttd | 1.0.0:beta3 |
openttd | openttd | 1.0.0:beta4 |
openttd | openttd | 1.0.0:rc1 |
openttd | openttd | 1.0.0:rc2 |
openttd | openttd | 1.0.0:rc3 |
openttd | openttd | 1.0.1 |
openttd | openttd | 1.0.1:rc1 |
openttd | openttd | 1.0.1:rc2 |
openttd | openttd | 1.0.2 |
openttd | openttd | 1.0.2:rc1 |
openttd | openttd | 1.0.3 |
openttd | openttd | 1.0.3:rc1 |
openttd | openttd | 1.0.4 |
openttd | openttd | 1.0.4:rc1 |
openttd | openttd | 1.0.5 |
openttd | openttd | 1.0.5:rc1 |
openttd | openttd | 1.0.5:rc2 |
openttd | openttd | 1.1.3 |
openttd | openttd | 1.1.4 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References