CVE-2010-4168

Severity

50%

Complexity

99%

Confidentiality

48%

Multiple use-after-free vulnerabilities in OpenTTD 1.0.x before 1.0.5 allow (1) remote attackers to cause a denial of service (invalid write and daemon crash) by abruptly disconnecting during transmission of the map from the server, related to network/network_server.cpp; (2) remote attackers to cause a denial of service (invalid read and daemon crash) by abruptly disconnecting, related to network/network_server.cpp; and (3) remote servers to cause a denial of service (invalid read and application crash) by forcing a disconnection during the join process, related to network/network.cpp.

Multiple use-after-free vulnerabilities in OpenTTD 1.0.x before 1.0.5 allow (1) remote attackers to cause a denial of service (invalid write and daemon crash) by abruptly disconnecting during transmission of the map from the server, related to network/network_server.cpp; (2) remote attackers to cause a denial of service (invalid read and daemon crash) by abruptly disconnecting, related to network/network_server.cpp; and (3) remote servers to cause a denial of service (invalid read and application crash) by forcing a disconnection during the join process, related to network/network.cpp.

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).

Overview

Type

OpenTTD

First reported 14 years ago

2010-11-17 16:00:00

Last updated 14 years ago

2010-12-18 07:06:00

Affected Software

OpenTTD OpenTTD 1.0.0

1.0.0

OpenTTD 1.0.0-beta1

1.0.0

OpenTTD 1.0.0-beta2

1.0.0

OpenTTD 1.0.0-beta3

1.0.0

OpenTTD 1.0.0-beta4

1.0.0

OpenTTD 1.0.0-RC1

1.0.0

OpenTTD 1.0.0-RC2

1.0.0

OpenTTD 1.0.0-RC3

1.0.0

OpenTTD 1.0.1

1.0.1

OpenTTD 1.0.1-RC1

1.0.1

OpenTTD 1.0.1-RC2

1.0.1

OpenTTD 1.0.2

1.0.2

OpenTTD 1.0.2-RC1

1.0.2

OpenTTD 1.0.3

1.0.3

OpenTTD 1.0.3-RC1

1.0.3

OpenTTD 1.0.4

1.0.4

OpenTTD 1.0.4 Release Candidate 1

1.0.4

OpenTTD 1.0.5 Release Candidate 1

1.0.5

OpenTTD 1.0.5 Release Candidate 2

1.0.5

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.