Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-3436

Опубликовано: 09 окт. 2012
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to clear a water tile, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a certain sequence of steps related to "the water/coast aspect of tiles which also have railtracks on one half."

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openttd:openttd:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.1:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.2:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.3:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.4:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.5:rc1:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.0.5:rc2:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:openttd:openttd:1.2.1:*:*:*:*:*:*:*

EPSS

Процентиль: 84%
0.0234
Низкий

5 Medium

CVSS2

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 13 лет назад

OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to clear a water tile, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a certain sequence of steps related to "the water/coast aspect of tiles which also have railtracks on one half."

debian
почти 13 лет назад

OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to cle ...

github
больше 3 лет назад

OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to clear a water tile, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a certain sequence of steps related to "the water/coast aspect of tiles which also have railtracks on one half."

fstec
почти 13 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 84%
0.0234
Низкий

5 Medium

CVSS2

Дефекты

CWE-20