Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-3577

Опубликовано: 10 авг. 2008
Источник: debian
EPSS Низкий

Описание

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openttdfixed0.6.2-1package

Примечания

  • no vulnerability at all, not exploitable remote or local, openttd

EPSS

Процентиль: 24%
0.0008
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.

nvd
больше 17 лет назад

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.

github
почти 4 года назад

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.

EPSS

Процентиль: 24%
0.0008
Низкий