Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2013-6411
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-14 Dec, 2013 | 17:21
Updated At-11 Apr, 2025 | 00:51

The HandleCrashedAircraft function in aircraft_cmd.cpp in OpenTTD 0.3.6 through 1.3.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) by crashing an aircraft outside of the map.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

openttd
openttd
>>openttd>>0.3.6
cpe:2.3:a:openttd:openttd:0.3.6:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.4.0
cpe:2.3:a:openttd:openttd:0.4.0:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.4.0.1
cpe:2.3:a:openttd:openttd:0.4.0.1:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.4.5
cpe:2.3:a:openttd:openttd:0.4.5:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.4.6
cpe:2.3:a:openttd:openttd:0.4.6:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.4.7
cpe:2.3:a:openttd:openttd:0.4.7:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.4.8
cpe:2.3:a:openttd:openttd:0.4.8:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.5.0
cpe:2.3:a:openttd:openttd:0.5.0:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.5.1
cpe:2.3:a:openttd:openttd:0.5.1:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.5.2
cpe:2.3:a:openttd:openttd:0.5.2:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.5.3
cpe:2.3:a:openttd:openttd:0.5.3:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.6.0
cpe:2.3:a:openttd:openttd:0.6.0:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.6.1
cpe:2.3:a:openttd:openttd:0.6.1:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.6.2
cpe:2.3:a:openttd:openttd:0.6.2:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.6.3
cpe:2.3:a:openttd:openttd:0.6.3:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.7.0
cpe:2.3:a:openttd:openttd:0.7.0:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.7.1
cpe:2.3:a:openttd:openttd:0.7.1:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.7.2
cpe:2.3:a:openttd:openttd:0.7.2:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.7.3
cpe:2.3:a:openttd:openttd:0.7.3:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.7.4
cpe:2.3:a:openttd:openttd:0.7.4:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>0.7.5
cpe:2.3:a:openttd:openttd:0.7.5:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.0
cpe:2.3:a:openttd:openttd:1.0.0:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.0
cpe:2.3:a:openttd:openttd:1.0.0:beta1:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.0
cpe:2.3:a:openttd:openttd:1.0.0:beta2:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.0
cpe:2.3:a:openttd:openttd:1.0.0:beta3:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.0
cpe:2.3:a:openttd:openttd:1.0.0:beta4:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.0
cpe:2.3:a:openttd:openttd:1.0.0:rc1:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.0
cpe:2.3:a:openttd:openttd:1.0.0:rc2:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.0
cpe:2.3:a:openttd:openttd:1.0.0:rc3:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.1
cpe:2.3:a:openttd:openttd:1.0.1:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.1
cpe:2.3:a:openttd:openttd:1.0.1:rc1:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.1
cpe:2.3:a:openttd:openttd:1.0.1:rc2:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.2
cpe:2.3:a:openttd:openttd:1.0.2:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.2
cpe:2.3:a:openttd:openttd:1.0.2:rc1:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.3
cpe:2.3:a:openttd:openttd:1.0.3:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.3
cpe:2.3:a:openttd:openttd:1.0.3:rc1:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.4
cpe:2.3:a:openttd:openttd:1.0.4:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.4
cpe:2.3:a:openttd:openttd:1.0.4:rc1:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.5
cpe:2.3:a:openttd:openttd:1.0.5:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.5
cpe:2.3:a:openttd:openttd:1.0.5:rc1:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.0.5
cpe:2.3:a:openttd:openttd:1.0.5:rc2:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.1.0
cpe:2.3:a:openttd:openttd:1.1.0:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.1.1
cpe:2.3:a:openttd:openttd:1.1.1:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.1.2
cpe:2.3:a:openttd:openttd:1.1.2:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.1.3
cpe:2.3:a:openttd:openttd:1.1.3:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.1.4
cpe:2.3:a:openttd:openttd:1.1.4:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.1.5
cpe:2.3:a:openttd:openttd:1.1.5:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.2.0
cpe:2.3:a:openttd:openttd:1.2.0:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.2.1
cpe:2.3:a:openttd:openttd:1.2.1:*:*:*:*:*:*:*
openttd
openttd
>>openttd>>1.2.2
cpe:2.3:a:openttd:openttd:1.2.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.openttd.org/task/5820secalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-updates/2013-12/msg00095.htmlsecalert@redhat.com
N/A
http://seclists.org/oss-sec/2013/q4/375secalert@redhat.com
N/A
http://secunia.com/advisories/55589secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/56218secalert@redhat.com
N/A
http://vcs.openttd.org/svn/changeset/26134secalert@redhat.com
Exploit
Patch
http://www.securityfocus.com/bid/64003secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/89334secalert@redhat.com
N/A
https://security.openttd.org/en/CVE-2013-6411secalert@redhat.com
N/A
http://bugs.openttd.org/task/5820af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2013-12/msg00095.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://seclists.org/oss-sec/2013/q4/375af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/55589af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/56218af854a3a-2127-422b-91ae-364da2661108
N/A
http://vcs.openttd.org/svn/changeset/26134af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://www.securityfocus.com/bid/64003af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/89334af854a3a-2127-422b-91ae-364da2661108
N/A
https://security.openttd.org/en/CVE-2013-6411af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found