Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 428376 (CVE-2012-3436) - <games-simulation/openttd-1.2.2: Denial of Service (CVE-2012-3436)
Summary: <games-simulation/openttd-1.2.2: Denial of Service (CVE-2012-3436)
Status: RESOLVED FIXED
Alias: CVE-2012-3436
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-07-27 21:58 UTC by Sean Amoss
Modified: 2013-09-03 21:26 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sean Amoss gentoo-dev Security 2012-07-27 21:58:09 UTC
Upstream requested a CVE identifier on oss-sec ML at $URL:

"we, the OpenTTD developers, have identified a security vulnerability in
OpenTTD (an open source game with multiplayer). Would you be so kind as 
to allocate a CVE id for this issue?

The issue concerns a denial of service vulnerabilty which enables
an attacker to force the server into an invalid game state. The
server will abort upon detecting this state.
This attack can be performed using an unmodified client via normal
game interaction. The attack requires authorization, but most servers
do not implement authorization. The first vulnerable version is 0.6.0,
the upcoming 1.2.2 release will have the issue fixed."
Comment 1 Matthijs Kooijman 2012-07-31 16:18:23 UTC
The detailed description is now public on
http://security.openttd.org/CVE-2012-3436

Note that both the problem description and patches have been updated
to cover a second case of this bug, so if you downloaded the patches
before 2012-07-31 16:00 UTC, please download them again.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2012-10-13 20:38:49 UTC
CVE-2012-3436 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3436):
  OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to clear a
  water tile, which allows remote attackers to cause a denial of service (NULL
  pointer dereference and server crash) via a certain sequence of steps
  related to "the water/coast aspect of tiles which also have railtracks on
  one half."
Comment 3 Chris Reffett gentoo-dev Security 2013-09-03 17:37:52 UTC
No affected versions in tree. GLSA vote: no.
Comment 4 Sean Amoss gentoo-dev Security 2013-09-03 21:26:22 UTC
GLSA vote: NO.

Closing noglsa.