Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <501389E3.3000407@redhat.com>
Date: Sat, 28 Jul 2012 00:42:43 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: frosch <frosch@...nttd.org>
Subject: Re: CVE request for OpenTTD

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/27/2012 03:42 PM, frosch wrote:
> Hello,
> 
> we, the OpenTTD developers, have identified a security
> vulnerability in OpenTTD (an open source game with multiplayer).
> Would you be so kind as to allocate a CVE id for this issue?
> 
> The issue concerns a denial of service vulnerabilty which enables 
> an attacker to force the server into an invalid game state. The 
> server will abort upon detecting this state. This attack can be
> performed using an unmodified client via normal game interaction.
> The attack requires authorization, but most servers do not
> implement authorization. The first vulnerable version is 0.6.0, the
> upcoming 1.2.2 release will have the issue fixed.
> 
> Once a CVE id is allocated, the issue and fix will be documented
> at http://security.openttd.org/CVE-2012-xxxx
> 
> Thanks in advance, Christoph 'frosch' Elsenhans
> 
> (Please CC me, I'm not subscribed)

Sorry can you please provide links to an advisory, code commit, or
something so we have a reference?


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=bnbQ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.