Описание
Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.
Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-3577
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44436
- http://bugs.gentoo.org/show_bug.cgi?id=233929
- http://secunia.com/advisories/34161
- http://security.gentoo.org/glsa/glsa-200903-09.xml
- http://sourceforge.net/project/shownotes.php?release_id=617243
- http://www.securityfocus.com/bid/30525
- http://www.vupen.com/english/advisories/2008/2285
Связанные уязвимости
Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.
Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.
Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows loca ...