Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200509-03] OpenTTD: Format string vulnerabilities

Vulnerability Assessment Details

[GLSA-200509-03] OpenTTD: Format string vulnerabilities

Vulnerability Assessment Summary
OpenTTD: Format string vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200509-03
(OpenTTD: Format string vulnerabilities)

Alexey Dobriyan discovered several format string vulnerabilities
in OpenTTD.


A remote attacker could exploit these vulnerabilities to crash the
OpenTTD server or client and possibly execute arbitrary code with the
rights of the user running OpenTTD.


There are no known workarounds at this time.


All OpenTTD users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=games-simulation/openttd-"

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

17" Asus x750J 8GB 1TB HDD Intel i7-4700HQ 2.4 GHz Windows 10 Notebook Laptop
17Desktop Computer AMD FX 6300 4Gb RAM 1Tb Hard Drive Windows 10 Home
Desktop Computer AMD FX 6300 4Gb RAM 1Tb Hard Drive Windows 10 Home pictureLenovo Edge 15 - 15.6" Intel Core i7-4510U 8GB 1TB
Lenovo Edge 15 - 15.62016 15" MacBook Pro: 2.9 Ghz i7, 16 GB Ram, 1TB SSD, Radeon Pro 460-Silver
2016 15


No Discussions have been posted on this vulnerability.