Vulnerability Description
Multiple use-after-free vulnerabilities in OpenTTD 1.0.x before 1.0.5 allow (1) remote attackers to cause a denial of service (invalid write and daemon crash) by abruptly disconnecting during transmission of the map from the server, related to network/network_server.cpp; (2) remote attackers to cause a denial of service (invalid read and daemon crash) by abruptly disconnecting, related to network/network_server.cpp; and (3) remote servers to cause a denial of service (invalid read and application crash) by forcing a disconnection during the join process, related to network/network.cpp.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openttd | Openttd | >= 1.0.0, < 1.0.5 |
| Fedoraproject | Fedora | 13 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052187.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052193.hMailing ListThird Party Advisory
- http://marc.info/?l=oss-security&m=128975491407670&w=2Mailing List
- http://marc.info/?l=oss-security&m=128984298802678&w=2Mailing List
- http://secunia.com/advisories/42578Broken Link
- http://security.openttd.org/en/CVE-2010-4168PatchVendor Advisory
- http://security.openttd.org/en/patch/28.patchPatch
- http://vcs.openttd.org/svn/changeset/21182Broken Link
- http://www.securityfocus.com/bid/44844Broken LinkThird Party AdvisoryVDB Entry
- http://www.vupen.com/english/advisories/2010/2985Broken LinkVendor Advisory
- http://www.vupen.com/english/advisories/2010/3199Broken Link
- http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052187.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052193.hMailing ListThird Party Advisory
- http://marc.info/?l=oss-security&m=128975491407670&w=2Mailing List
- http://marc.info/?l=oss-security&m=128984298802678&w=2Mailing List
FAQ
What is CVE-2010-4168?
CVE-2010-4168 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple use-after-free vulnerabilities in OpenTTD 1.0.x before 1.0.5 allow (1) remote attackers to cause a denial of service (invalid write and daemon crash) by abruptly disconnecting during transmis...
How severe is CVE-2010-4168?
CVE-2010-4168 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4168?
Check the references section above for vendor advisories and patch information. Affected products include: Openttd Openttd, Fedoraproject Fedora.