Upstream requested a CVE identifier on oss-sec ML at $URL:
"we, the OpenTTD developers, have identified a security vulnerability in
OpenTTD (an open source game with multiplayer). Would you be so kind as
to allocate a CVE id for this issue?
The issue concerns a denial of service vulnerabilty which enables
an attacker to force the server into an invalid game state. The
server will abort upon detecting this state.
This attack can be performed using an unmodified client via normal
game interaction. The attack requires authorization, but most servers
do not implement authorization. The first vulnerable version is 0.6.0,
the upcoming 1.2.2 release will have the issue fixed."
The detailed description is now public on
Note that both the problem description and patches have been updated
to cover a second case of this bug, so if you downloaded the patches
before 2012-07-31 16:00 UTC, please download them again.
OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to clear a
water tile, which allows remote attackers to cause a denial of service (NULL
pointer dereference and server crash) via a certain sequence of steps
related to "the water/coast aspect of tiles which also have railtracks on
No affected versions in tree. GLSA vote: no.
GLSA vote: NO.