Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-3577

Overview

Vulnerability Score 4.6 4.6
CVE Id CVE-2008-3577
Last Modified 07 Mar 2011 10:11:00
Published 10 Aug 2008 05:41:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2008-3577

Summary

Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.

Vulnerable Systems

Application

  • Openttd 0.1.1

  • Openttd 0.1.2

  • Openttd 0.1.3

  • Openttd 0.1.4

  • Openttd 0.2.0

  • Openttd 0.2.1

  • Openttd 0.3.0

  • Openttd 0.3.1

  • Openttd 0.3.2

  • Openttd 0.3.2.1

  • Openttd 0.3.3

  • Openttd 0.3.4

  • Openttd 0.3.5

  • Openttd 0.3.6

  • Openttd 0.4.0

  • Openttd 0.4.0.1

  • Openttd 0.4.5

  • Openttd 0.4.6

  • Openttd 0.4.7

  • Openttd 0.4.8

  • Openttd 0.5.0

  • Openttd 0.5.1

  • Openttd 0.5.2

  • Openttd 0.5.3

  • Openttd 0.6.0

  • Openttd 0.6.1


References

XF - openttd-ttdmain-bo(44436)

VUPEN - ADV-2008-2285

BID - 30525

CONFIRM - http://sourceforge.net/project/shownotes.php?release_id=617243

GENTOO - GLSA-200903-09

SECUNIA - 34161

CONFIRM - http://bugs.gentoo.org/show_bug.cgi?id=233929


Last Updated: 27 May 2016 10:48:14