FreeBSD : OpenTTD -- Multiple buffer overflows in validation of external data (9bad5ab1-f3f6-11e0-8b5c-b482fe3f522d)

medium Nessus Plugin ID 56522

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The OpenTTD Team reports :

Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file.

Solution

Update the affected package.

See Also

http://security.openttd.org/en/CVE-2011-3343

http://www.nessus.org/u?bcca78a3

Plugin Details

Severity: Medium

ID: 56522

File Name: freebsd_pkg_9bad5ab1f3f611e08b5cb482fe3f522d.nasl

Version: 1.6

Type: local

Published: 10/17/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openttd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/16/2011

Vulnerability Publication Date: 8/25/2011

Reference Information

CVE: CVE-2011-3343