aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authordanfe <danfe@FreeBSD.org>2012-01-17 16:31:38 +0800
committerdanfe <danfe@FreeBSD.org>2012-01-17 16:31:38 +0800
commitee386973ebd59255f423a88106b89dba924d5a43 (patch)
treedb0580c074651bb88f6b03d7151bb0230fb1b562 /security/vuxml
parent0ca923c14f5e1680c49e7a47562e4ff9450ca212 (diff)
downloadfreebsd-ports-gnome-ee386973ebd59255f423a88106b89dba924d5a43.tar.gz
freebsd-ports-gnome-ee386973ebd59255f423a88106b89dba924d5a43.tar.zst
freebsd-ports-gnome-ee386973ebd59255f423a88106b89dba924d5a43.zip
Document recent vulnerability of OpenTTD game server.
Reported by: Ilya Arkhipov
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index f1fa5b40fd28..2baa7e5c524d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -47,6 +47,40 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1ac858b0-3fae-11e1-a127-0013d3ccd9df">
+ <topic>OpenTTD -- Denial of service (server) via slow read attack</topic>
+ <affects>
+ <package>
+ <name>openttd</name>
+ <range><ge>0.3.5</ge><lt>1.1.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The OpenTTD Team reports:</p>
+ <blockquote cite="http://security.openttd.org/en/CVE-2012-0049">
+ <p>Using a slow read type attack it is possible to prevent anyone
+ from joining a server with virtually no resources. Once downloading
+ the map no other downloads of the map can start, so downloading
+ really slowly will prevent others from joining. This can be further
+ aggravated by the pause-on-join setting in which case the game is
+ paused and the players cannot continue the game during such an
+ attack. This attack requires that the user is not banned and passes
+ the authorization to the server, although for many servers there is
+ no server password and thus authorization is easy.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-0049</cvename>
+ <url>http://security.openttd.org/en/CVE-2011-3343</url>
+ </references>
+ <dates>
+ <discovery>2012-01-06</discovery>
+ <entry>2012-01-16</entry>
+ </dates>
+ </vuln>
+
<vuln vid="91be81e7-3fea-11e1-afc7-2c4138874f7d">
<topic>Multiple implementations denial-of-service via hash algorithm collision</topic>
<affects>