Vulnerability Description
Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlikely that this issue would cross privilege boundaries in typical environments.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openttd | Openttd | 0.1.1 |
Related Weaknesses (CWE)
References
- http://bugs.gentoo.org/show_bug.cgi?id=233929
- http://secunia.com/advisories/34161
- http://security.gentoo.org/glsa/glsa-200903-09.xml
- http://sourceforge.net/project/shownotes.php?release_id=617243
- http://www.securityfocus.com/bid/30525
- http://www.vupen.com/english/advisories/2008/2285
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44436
- http://bugs.gentoo.org/show_bug.cgi?id=233929
- http://secunia.com/advisories/34161
- http://security.gentoo.org/glsa/glsa-200903-09.xml
- http://sourceforge.net/project/shownotes.php?release_id=617243
- http://www.securityfocus.com/bid/30525
- http://www.vupen.com/english/advisories/2008/2285
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44436
FAQ
What is CVE-2008-3577?
CVE-2008-3577 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Buffer overflow in src/openttd.cpp in OpenTTD before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. NOTE: it is unlik...
How severe is CVE-2008-3577?
CVE-2008-3577 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3577?
Check the references section above for vendor advisories and patch information. Affected products include: Openttd Openttd.