CVE-2011-3342

NameCVE-2011-3342
DescriptionMultiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2386-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openttd (PTS)buster1.8.0-2fixed
bullseye1.10.3-1fixed
bookworm13.0-2fixed
trixie13.4-1fixed
sid14.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openttdsourcelenny0.6.2-1+lenny4DSA-2386-1
openttdsourcesqueeze1.0.4-4DSA-2386-1
openttdsource(unstable)1.1.3-1

Notes

https://www.openwall.com/lists/oss-security/2011/09/02/4

Search for package or bug name: Reporting problems