oss-sec mailing list archives

Re: CVE request for OpenTTD


From: Kurt Seifried <kseifried () redhat com>
Date: Sat, 28 Jul 2012 00:42:43 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/27/2012 03:42 PM, frosch wrote:
Hello,

we, the OpenTTD developers, have identified a security
vulnerability in OpenTTD (an open source game with multiplayer).
Would you be so kind as to allocate a CVE id for this issue?

The issue concerns a denial of service vulnerabilty which enables 
an attacker to force the server into an invalid game state. The 
server will abort upon detecting this state. This attack can be
performed using an unmodified client via normal game interaction.
The attack requires authorization, but most servers do not
implement authorization. The first vulnerable version is 0.6.0, the
upcoming 1.2.2 release will have the issue fixed.

Once a CVE id is allocated, the issue and fix will be documented
at http://security.openttd.org/CVE-2012-xxxx

Thanks in advance, Christoph 'frosch' Elsenhans

(Please CC me, I'm not subscribed)

Sorry can you please provide links to an advisory, code commit, or
something so we have a reference?


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=bnbQ
-----END PGP SIGNATURE-----


Current thread: