Summary
This host is installed with OpenTTD and is prone to multiple security bypass vulnerabilities.
Impact
Successful exploitation will allow attackers to bypass certain security restrictions and cause Denial of Service.
Impact Level: Application
Solution
Upgrade to the latest version of OpenTTD 1.0.1 or later, For updates refer to http://www.openttd.org
Insight
The flaws are due to
- error in the handling of password requests which accepts a company password for authentication in response to a request for the server password.
- A file descriptor leak can be exploited to crash the server by performing incomplete downloads of the map.
- Improper validation of index values of certain items.
Affected
OpenTTD 1.0 and prior.
References
Severity
Classification
-
CVE CVE-2010-0401, CVE-2010-0402, CVE-2010-0406 -
CVSS Base Score: 6.5
AV:N/AC:L/Au:S/C:P/I:P/A:P
Related Vulnerabilities