GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Mar 07, 2009 9:26 pm Post subject: [ GLSA 200903-09 ] OpenTTD: Execution of arbitrary code |
|
|
Gentoo Linux Security Advisory
Title: OpenTTD: Execution of arbitrary code (GLSA 200903-09)
Severity: high
Exploitable: remote
Date: March 07, 2009
Bug(s): #233929
ID: 200903-09
Synopsis
Multiple buffer overflows in OpenTTD might allow for the execution of arbitrary code in the server.
Background
OpenTTD is a clone of Transport Tycoon Deluxe.
Affected Packages
Package: games-simulation/openttd
Vulnerable: < 0.6.3
Unaffected: >= 0.6.3
Architectures: All supported architectures
Description
Multiple buffer overflows have been reported in OpenTTD, when storing long for client names (CVE-2008-3547), in the TruncateString function in src/gfx.cpp (CVE-2008-3576) and in src/openttd.cpp when processing a large filename supplied to the "-g" parameter in the ttd_main function (CVE-2008-3577).
Impact
An authenticated attacker could exploit these vulnerabilities to execute arbitrary code with the privileges of the OpenTTD server.
Workaround
There is no known workaround at this time.
Resolution
All OpenTTD users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.6.3" |
References
CVE-2008-3547
CVE-2008-3576
CVE-2008-3577 |
|