Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9c82-jpgp-p5fv

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.

EPSS

Процентиль: 24%
0.0008
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 17 лет назад

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.

nvd
больше 17 лет назад

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.

debian
больше 17 лет назад

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows loca ...

EPSS

Процентиль: 24%
0.0008
Низкий

Дефекты

CWE-119