FKIE_CVE-2010-2534

Vulnerability from fkie_nvd - Published: 2010-07-28 12:48 - Updated: 2025-04-11 00:51
Severity ?
Summary
The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue.
References
secalert@redhat.comhttp://bugs.openttd.org/task/3909Patch
secalert@redhat.comhttp://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patchPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html
secalert@redhat.comhttp://osvdb.org/66503
secalert@redhat.comhttp://secunia.com/advisories/40630Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/40760Vendor Advisory
secalert@redhat.comhttp://security.openttd.org/en/CVE-2010-2534Patch, Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/07/20/1
secalert@redhat.comhttp://www.securityfocus.com/bid/41804Patch
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1888Patch, Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1916Vendor Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/60568
af854a3a-2127-422b-91ae-364da2661108http://bugs.openttd.org/task/3909Patch
af854a3a-2127-422b-91ae-364da2661108http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/66503
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40630Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40760Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.openttd.org/en/CVE-2010-2534Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/07/20/1
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/41804Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1888Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1916Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/60568
Impacted products
Vendor Product Version
openttd openttd 0.1.1
openttd openttd 0.1.2
openttd openttd 0.1.3
openttd openttd 0.1.4
openttd openttd 0.2.0
openttd openttd 0.2.1
openttd openttd 0.3.0
openttd openttd 0.3.1
openttd openttd 0.3.2
openttd openttd 0.3.2.1
openttd openttd 0.3.3
openttd openttd 0.3.4
openttd openttd 0.3.5
openttd openttd 0.3.6
openttd openttd 0.3.7
openttd openttd 0.4.0
openttd openttd 0.4.0.1
openttd openttd 0.4.5
openttd openttd 0.4.6
openttd openttd 0.4.7
openttd openttd 0.4.8
openttd openttd 0.4.8
openttd openttd 0.4.8
openttd openttd 0.5.0
openttd openttd 0.5.0
openttd openttd 0.5.0
openttd openttd 0.5.0
openttd openttd 0.5.0
openttd openttd 0.5.0
openttd openttd 0.5.1
openttd openttd 0.5.1
openttd openttd 0.5.1
openttd openttd 0.5.1
openttd openttd 0.5.2
openttd openttd 0.5.2
openttd openttd 0.5.3
openttd openttd 0.5.3
openttd openttd 0.5.3
openttd openttd 0.5.3
openttd openttd 0.6.0
openttd openttd 0.6.0
openttd openttd 0.6.0
openttd openttd 0.6.0
openttd openttd 0.6.0
openttd openttd 0.6.0
openttd openttd 0.6.0
openttd openttd 0.6.1
openttd openttd 0.6.1
openttd openttd 0.6.1
openttd openttd 0.6.2
openttd openttd 0.6.2
openttd openttd 0.6.2
openttd openttd 0.6.3
openttd openttd 0.6.3
openttd openttd 0.7.0
openttd openttd 0.7.0
openttd openttd 0.7.0
openttd openttd 0.7.0
openttd openttd 0.7.0
openttd openttd 0.7.1
openttd openttd 0.7.1
openttd openttd 0.7.1
openttd openttd 0.7.1
openttd openttd 0.7.2
openttd openttd 0.7.2
openttd openttd 0.7.2
openttd openttd 0.7.3
openttd openttd 0.7.3
openttd openttd 0.7.3
openttd openttd 0.7.4
openttd openttd 0.7.4
openttd openttd 0.7.5
openttd openttd 0.7.5
openttd openttd 1.0.0
openttd openttd 1.0.0
openttd openttd 1.0.0
openttd openttd 1.0.0
openttd openttd 1.0.0
openttd openttd 1.0.0
openttd openttd 1.0.0
openttd openttd 1.0.0
openttd openttd 1.0.1
openttd openttd 1.0.1
openttd openttd 1.0.1
openttd openttd 1.0.2
openttd openttd 1.0.2
openttd openttd 1.0.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "499EFCAE-9309-4C26-A846-10396CBC628D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6908E44D-3553-430D-B870-266971DC0D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBDEF33-48E4-42F4-A725-838DA9191334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "422B0D3E-503C-4CA6-83B9-4FC58BA898C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46557BD6-66A0-4892-9468-687A4B63F5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A186C5E-ACAA-47C8-9FA0-133E9D7F2900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24094775-BAF9-4C2E-8C38-86916E22B5A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7CF73FA-09F6-4CE5-932E-BA6B43D66F1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E87583-5769-4114-94F7-043897DA0FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "718E8C39-A59C-4576-B00D-31A8F0C1762C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "83B1A7D7-D920-41F3-8DE9-D39007DDDEFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "327B826F-0F4E-420D-8C93-4551A4B9F190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE12C455-5CA0-4581-A3F3-CC8867CCEEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DC5E23E-3A14-49B4-A676-AAA96F25D01D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8520357A-27AF-4F48-9095-773F75AAC408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65EA852-3C46-47D6-8D6B-DC3546165CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4441B6D-1A48-4DD4-AAAB-FC3B5F00DE4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "985D96E7-0BAE-46DF-A1E2-BD4585C6CABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73062670-5CB9-4AB8-B45D-21E0D557FD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "876A0BCB-F792-4A21-85AB-5D7D63C3E987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "97BFB677-F29E-451E-855A-452F8AE0A9D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.4.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "99308463-E1A6-4018-819E-29043BFE8886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.4.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C9E8C9AB-C303-4FB0-AD1D-C7EE4E93E347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5AEFDA-322E-49CD-AE94-82020B9B7AE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6AF50B50-ED50-4BCD-8BAE-9161911A0FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E3485EF5-F3DF-4622-92D9-B092F46D5AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "12EB77E6-94D0-4980-B392-59ACABEDB8D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "3051AB9F-5C64-4D95-805F-8575B5BD39D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "494DD878-5854-49DC-A0E1-2904D70582EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD07BE5-47E4-47E6-B6A2-CEC2BCC3E383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1A5AA729-0198-4644-9810-E501C3C47EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1D5EC680-4686-4C04-957E-B597A1563F1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F2C02877-6FE8-4C98-9AB6-5E4D1AC49FFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89325227-4E0A-49FA-83C1-D0D5E2CEF45D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "21763CB0-1FFA-4FF4-AA6F-47614E8BEEB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A151DBA9-3A94-431F-BC22-C86E4268263B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7246859E-A6CF-4617-A37A-BF17849D43F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "85FA63BC-2292-49F8-A0E1-34C8497236C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.5.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "78365F07-CF44-48FD-B048-2F510D147D0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBAD231-4365-4A5F-9FD8-1EE13F7FC8A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B052159B-4CFF-47DE-A1B7-35C467AD73BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "BDF5228B-B99A-4E4E-A66F-59275A36B28E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F1FE7-ADCB-42AD-AB99-0F17AD8E2FE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "CD6E4B8D-6C12-4053-A8D2-F64F92AF733A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "9B9BDCD3-85B9-4C17-B625-FC7F62450FB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8648A48E-BCF9-4B34-B1FF-16B780C2797D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B0C66D6-F933-43B1-8BC0-72625E70442C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "72070978-F3B9-46D6-A3FD-0932D751AD86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5D6483EA-FC98-4367-A34B-795F858815E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E775B6E0-8887-4BB8-AB39-EDD2FAC7A61E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DAE2A501-3F40-4BFD-B600-AD122BB8EFD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D49CDF39-F0F2-4B48-87FC-4F984D439497",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "325AB3F6-AB2C-4340-A566-816CB65134F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.6.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D694BCA6-9FF4-4447-85F8-99E7F05C8509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9AACD8-B19A-4466-B68D-FAA074240F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6BE4AC57-8B55-42D9-969E-6201339941BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "6FF99FCC-D8B8-4D83-AF51-DC98E1B99FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "23706F5C-601D-4502-A23B-B92C3A1EC575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2830F3D8-A8C1-4296-A734-063A003B6DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F975E7D2-864D-4DD7-8564-1B00F42110D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "48B7FC7C-5F22-47B3-9892-3750947D673D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "EAD5F10E-9AC3-4A34-882A-21D2EBF0B2AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8911F113-1519-481A-A2B2-0EE15B1B482A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC474337-934C-40F6-B6D8-0DA6C0874067",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6B9881F6-F1ED-4E2E-8816-0FAF3FF1BFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F7139F5C-24BC-470C-880B-7D3B7FB378A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "94B07B0C-31AF-46C3-BB4A-4DC8632E9780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DFC40FC9-B80F-4203-9357-D6D736C2F870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B40E53AA-7327-46D0-A1D9-ED680D1F7DD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E1E187C-6F26-4604-9720-0C516E8BAF9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AAB61223-CC9F-44A4-96A9-09CCE32B85F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "18264F19-D58E-46C7-AA06-B47EFF15E165",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:0.7.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "14A1DC8C-B476-49E2-8FE7-2FFA5CA28267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B98521C-E198-4B1C-9E12-D38E919ECEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "3B784070-8D6E-4E90-9ECB-5501B70DD8E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8C72B46F-72AC-4E11-B8F6-81E59B5083F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "FF964E94-DD96-4ED5-B703-56146510F1C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0B42597-ECA1-439C-9FE6-35E6066098F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "756D4F4A-7B5B-46FF-8AA8-B3E39F9822A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E98D59D3-C5CF-4568-B0DB-339F56901E35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D5BCF1D4-EBE5-40FD-99BF-9AF222F60662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D3D74EC-A83E-4BE2-BA20-28F67A2A21DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "49FD4CD9-E154-40DB-83EF-5178B883BEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "641A4BFB-434B-437B-8040-6522A111EA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "794D67C0-9B24-42C9-B4E4-C6267902B229",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F1288AE8-47EA-4821-8A47-DF3E08F47644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openttd:openttd:1.0.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AEECF013-7EDF-431D-94CF-E64DAF741101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n NetworkSyncCommandQueue en network/network_command.cpp en OpenTTD anterior a v1.0.3 no limpia de forma adecuada un puntero en una lista enlazada, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito y consumo de CPU) a trav\u00e9s de una petici\u00f3n manipulada, relativo a la cola de comandos del cliente."
    }
  ],
  "id": "CVE-2010-2534",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-07-28T12:48:53.197",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.openttd.org/task/3909"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/66503"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40630"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40760"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://security.openttd.org/en/CVE-2010-2534"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2010/07/20/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/41804"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1888"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1916"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.openttd.org/task/3909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/66503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40760"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://security.openttd.org/en/CVE-2010-2534"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/07/20/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/41804"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60568"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…