Resource Management Errors The advisory has been revoked - it doesn't affect any version of package openttd  (opens in a new tab)


Threat Intelligence

EPSS
5.07% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1504-OPENTTD-649295
  • published10 Sept 2020
  • disclosed25 Aug 2012

Introduced: 25 Aug 2012

CVE-2012-0048  (opens in a new tab)
CWE-399  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:15.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openttd package and not the openttd package as distributed by Ubuntu.

OpenTTD 0.3.5 through 1.1.4 allows remote attackers to cause a denial of service (game pause) by connecting to the server and not finishing the (1) authorization phase or (2) map download, aka a "slow read" attack.