The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/60568 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html | vendor advisory |
http://www.vupen.com/english/advisories/2010/1888 | vdb entry patch vendor advisory |
http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch | patch |
http://security.openttd.org/en/CVE-2010-2534 | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2010/07/20/1 | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html | vendor advisory |
http://bugs.openttd.org/task/3909 | patch |
http://www.securityfocus.com/bid/41804 | vdb entry patch |
http://osvdb.org/66503 | vdb entry |
http://secunia.com/advisories/40760 | third party advisory vendor advisory |
http://secunia.com/advisories/40630 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2010/1916 | vdb entry vendor advisory |