|
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.801206 |
Categoría: | General |
Título: | OpenTTD Multiple Security bypass vulnerabilities |
Resumen: | Check for the version of OpenTTD |
Descripción: | Description: Overview: This host is installed with OpenTTD and is prone to multiple security bypass vulnerabilities. Vulnerability Insight: The flaws are due to - error in the handling of password requests which accepts a company password for authentication in response to a request for the server password. - A file descriptor leak can be exploited to crash the server by performing incomplete downloads of the map. - Improper validation of index values of certain items. Impact: Successful exploitation will allow attackers to bypass certain security restrictions and cause Denial of Service. Impact Level: Application Affected Software/OS: OpenTTD 1.0 and prior. Fix: Upgrade to the latest version of OpenTTD 1.0.1 or later, For updates refer to http://www.openttd.org References: http://secunia.com/advisories/39669 http://security.openttd.org/en/CVE-2010-0401 http://security.openttd.org/en/CVE-2010-0402 http://security.openttd.org/en/CVE-2010-0406 CVSS Score: 6.5 CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P |
Referencia Cruzada: |
BugTraq ID: 39874 Common Vulnerability Exposure (CVE) ID: CVE-2010-0401 http://secunia.com/advisories/39669 Common Vulnerability Exposure (CVE) ID: CVE-2010-0402 Common Vulnerability Exposure (CVE) ID: CVE-2010-0406 |
Copyright | Copyright (C) 2010 Greenbone Networks GmbH |
Esta es sólo una de 58962 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |
|