CVE-2012-3436
09.10.2012, 18:55
OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to clear a water tile, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a certain sequence of steps related to "the water/coast aspect of tiles which also have railtracks on one half."Enginsight
Vendor | Product | Version |
---|---|---|
openttd | openttd | 0.6.0 |
openttd | openttd | 0.6.1 |
openttd | openttd | 0.6.2 |
openttd | openttd | 0.6.3 |
openttd | openttd | 0.7.0 |
openttd | openttd | 0.7.1 |
openttd | openttd | 0.7.2 |
openttd | openttd | 0.7.3 |
openttd | openttd | 0.7.4 |
openttd | openttd | 0.7.5 |
openttd | openttd | 1.0.0 |
openttd | openttd | 1.0.0:beta1 |
openttd | openttd | 1.0.0:beta2 |
openttd | openttd | 1.0.0:beta3 |
openttd | openttd | 1.0.0:beta4 |
openttd | openttd | 1.0.0:rc1 |
openttd | openttd | 1.0.0:rc2 |
openttd | openttd | 1.0.0:rc3 |
openttd | openttd | 1.0.1 |
openttd | openttd | 1.0.1:rc1 |
openttd | openttd | 1.0.1:rc2 |
openttd | openttd | 1.0.2 |
openttd | openttd | 1.0.2:rc1 |
openttd | openttd | 1.0.3 |
openttd | openttd | 1.0.3:rc1 |
openttd | openttd | 1.0.4 |
openttd | openttd | 1.0.4:rc1 |
openttd | openttd | 1.0.5 |
openttd | openttd | 1.0.5:rc1 |
openttd | openttd | 1.0.5:rc2 |
openttd | openttd | 1.1.0 |
openttd | openttd | 1.1.1 |
openttd | openttd | 1.1.2 |
openttd | openttd | 1.1.3 |
openttd | openttd | 1.1.4 |
openttd | openttd | 1.1.5 |
openttd | openttd | 1.2.0 |
openttd | openttd | 1.2.1 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References