CVE-2011-3342

NameCVE-2011-3342
DescriptionMultiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2386-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openttd (PTS)wheezy1.2.1-3fixed
jessie1.4.4-2fixed
stretch1.6.1-1fixed
buster, sid1.7.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openttdsource(unstable)1.1.3-1high
openttdsourcelenny0.6.2-1+lenny4highDSA-2386-1
openttdsourcesqueeze1.0.4-4highDSA-2386-1

Notes

http://www.openwall.com/lists/oss-security/2011/09/02/4

Search for package or bug name: Reporting problems