Vulnerabilities > CVE-2011-3341 - Numeric Errors vulnerability in Openttd
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple off-by-one errors in order_cmd.cpp in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted CMD_INSERT_ORDER command.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2011-12975.NASL description This update fixes some crash issues which can have security implications. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 56234 published 2011-09-20 reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/56234 title Fedora 14 : openttd-1.1.3-1.fc14 (2011-12975) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2011-12975. # include("compat.inc"); if (description) { script_id(56234); script_version("1.10"); script_cvs_date("Date: 2019/08/02 13:32:34"); script_cve_id("CVE-2011-3341", "CVE-2011-3342", "CVE-2011-3343"); script_bugtraq_id(49439); script_xref(name:"FEDORA", value:"2011-12975"); script_name(english:"Fedora 14 : openttd-1.1.3-1.fc14 (2011-12975)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update fixes some crash issues which can have security implications. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=735841" ); # https://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?59913611" ); script_set_attribute( attribute:"solution", value:"Update the affected openttd package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:openttd"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:14"); script_set_attribute(attribute:"patch_publication_date", value:"2011/09/19"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/09/20"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^14([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 14.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC14", reference:"openttd-1.1.3-1.fc14")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openttd"); }
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_E77BEFB5F3F911E08B5CB482FE3F522D.NASL description The OpenTTD Team reports : Multiple off-by-one errors in order_cmd.cpp in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted CMD_INSERT_ORDER command. last seen 2020-06-01 modified 2020-06-02 plugin id 56523 published 2011-10-17 reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/56523 title FreeBSD : OpenTTD -- Denial of service via improperly validated commands (e77befb5-f3f9-11e0-8b5c-b482fe3f522d) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-2386.NASL description Several vulnerabilities have been discovered in OpenTTD, a transport business simulation game. Multiple buffer overflows and off-by-one errors allow remote attackers to cause denial of service. last seen 2020-03-17 modified 2012-01-12 plugin id 57526 published 2012-01-12 reporter This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/57526 title Debian DSA-2386-1 : openttd - several vulnerabilities NASL family Fedora Local Security Checks NASL id FEDORA_2011-12945.NASL description This update fixes some crash issues which can have security implications. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 56362 published 2011-10-03 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/56362 title Fedora 16 : openttd-1.1.3-1.fc16 (2011-12945) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201111-03.NASL description The remote host is affected by the vulnerability described in GLSA-201111-03 (OpenTTD: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in OpenTTD. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could execute arbitrary code with the privileges of the OpenTTD process or cause a Denial of Service. Local users could cause a Denial of Service. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 56807 published 2011-11-14 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/56807 title GLSA-201111-03 : OpenTTD: Multiple vulnerabilities
References
- http://bugs.openttd.org/task/4745
- http://bugs.openttd.org/task/4745/getfile/7707/fixcmds.diff
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html
- http://openwall.com/lists/oss-security/2011/09/02/4
- http://openwall.com/lists/oss-security/2011/09/06/2
- http://secunia.com/advisories/46075
- http://security.openttd.org/en/CVE-2011-3341
- http://www.debian.org/security/2012/dsa-2386
- http://www.securityfocus.com/bid/49439
- http://bugs.openttd.org/task/4745
- http://www.securityfocus.com/bid/49439
- http://www.debian.org/security/2012/dsa-2386
- http://security.openttd.org/en/CVE-2011-3341
- http://secunia.com/advisories/46075
- http://openwall.com/lists/oss-security/2011/09/06/2
- http://openwall.com/lists/oss-security/2011/09/02/4
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html
- http://bugs.openttd.org/task/4745/getfile/7707/fixcmds.diff