Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200509-03] OpenTTD: Format string vulnerabilities


Vulnerability Assessment Details

[GLSA-200509-03] OpenTTD: Format string vulnerabilities

Vulnerability Assessment Summary
OpenTTD: Format string vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200509-03
(OpenTTD: Format string vulnerabilities)


Alexey Dobriyan discovered several format string vulnerabilities
in OpenTTD.

Impact

A remote attacker could exploit these vulnerabilities to crash the
OpenTTD server or client and possibly execute arbitrary code with the
rights of the user running OpenTTD.

Workaround

There are no known workarounds at this time.

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2763


Solution:
All OpenTTD users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.4.0.1-r1"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Philips VoIP841C Phone Skype base Charger Only.
$12.0
Philips VoIP841C Phone Skype base Charger Only. pictureGrandstream GXV3240 Multimedia IP Phone for Android VoIP and Device
$79.13
Grandstream GXV3240 Multimedia IP Phone for Android VoIP and Device pictureGrandstream HandyTone 502 2FXS Analog VoIP Adapter HT-502 HT502
$49.95
Grandstream HandyTone 502 2FXS Analog VoIP Adapter HT-502 HT502 pictureOoma Hub VoIP Phone Adapter
$26.0
Ooma Hub VoIP Phone Adapter picture


Discussions

No Discussions have been posted on this vulnerability.