|Title:||OpenTTD Multiple Security bypass vulnerabilities|
|Summary:||Check for the version of OpenTTD|
Overview: This host is installed with OpenTTD and is prone to multiple
security bypass vulnerabilities.
The flaws are due to
- error in the handling of password requests which accepts a company
password for authentication in response to a request for the server
- A file descriptor leak can be exploited to crash the server by performing
incomplete downloads of the map.
- Improper validation of index values of certain items.
Successful exploitation will allow attackers to bypass certain security
restrictions and cause Denial of Service.
Impact Level: Application
OpenTTD 1.0 and prior.
Upgrade to the latest version of OpenTTD 1.0.1 or later,
For updates refer to http://www.openttd.org
BugTraq ID: 39874|
Common Vulnerability Exposure (CVE) ID: CVE-2010-0401
Common Vulnerability Exposure (CVE) ID: CVE-2010-0402
Common Vulnerability Exposure (CVE) ID: CVE-2010-0406
|Copyright||Copyright (C) 2010 Greenbone Networks GmbH|
|This is only one of 51095 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.