Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://security.openttd.org/en/CVE-2011-3342
http://www.vuxml.org/freebsd/78c25ed7-f3f9-11e0-8b5c-b482fe3f522d.html
Insight
The following package is affected: openttd
CVE-2011-3342
Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
Severity
Classification
-
CVE CVE-2011-3342 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities