CVE-2012-3436

EUVD-2012-3403
OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to clear a water tile, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a certain sequence of steps related to "the water/coast aspect of tiles which also have railtracks on one half."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
Affected Products (NVD)
VendorProductVersion
openttdopenttd
0.6.0
openttdopenttd
0.6.1
openttdopenttd
0.6.2
openttdopenttd
0.6.3
openttdopenttd
0.7.0
openttdopenttd
0.7.1
openttdopenttd
0.7.2
openttdopenttd
0.7.3
openttdopenttd
0.7.4
openttdopenttd
0.7.5
openttdopenttd
1.0.0
openttdopenttd
1.0.0:beta1
openttdopenttd
1.0.0:beta2
openttdopenttd
1.0.0:beta3
openttdopenttd
1.0.0:beta4
openttdopenttd
1.0.0:rc1
openttdopenttd
1.0.0:rc2
openttdopenttd
1.0.0:rc3
openttdopenttd
1.0.1
openttdopenttd
1.0.1:rc1
openttdopenttd
1.0.1:rc2
openttdopenttd
1.0.2
openttdopenttd
1.0.2:rc1
openttdopenttd
1.0.3
openttdopenttd
1.0.3:rc1
openttdopenttd
1.0.4
openttdopenttd
1.0.4:rc1
openttdopenttd
1.0.5
openttdopenttd
1.0.5:rc1
openttdopenttd
1.0.5:rc2
openttdopenttd
1.1.0
openttdopenttd
1.1.1
openttdopenttd
1.1.2
openttdopenttd
1.1.3
openttdopenttd
1.1.4
openttdopenttd
1.1.5
openttdopenttd
1.2.0
openttdopenttd
1.2.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openttd
bookworm
13.0-2
fixed
bullseye
1.10.3-1
fixed
sid
14.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openttd
hardy
ignored
lucid
ignored
natty
ignored
oneiric
ignored
precise
ignored
quantal
ignored
raring
not-affected
saucy
not-affected
trusty
dne
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected