Unrated severityNVD Advisory· Published Aug 25, 2012· Updated Apr 29, 2026
CVE-2012-0048
CVE-2012-0048
Description
OpenTTD 0.3.5 through 1.1.4 allows remote attackers to cause a denial of service (game pause) by connecting to the server and not finishing the (1) authorization phase or (2) map download, aka a "slow read" attack.
Affected products
85cpe:2.3:a:openttd:openttd:0.3.5:*:*:*:*:*:*:*+ 84 more
- cpe:2.3:a:openttd:openttd:0.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.4.8:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.4.8:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.1:rc3:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.5.3:rc3:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.2-rc1:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.2-rc2:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.6.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.1:rc3:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:0.7.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.0.5:rc2:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:openttd:openttd:1.1.4:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- vcs.openttd.org/svn/changeset/23764nvdExploitPatch
- bugs.openttd.org/task/4955nvdVendor Advisory
- secunia.com/advisories/50137nvdVendor Advisory
- security.openttd.org/en/CVE-2012-0049nvdVendor Advisory
- www.debian.org/security/2012/dsa-2524nvd
- www.openwall.com/lists/oss-security/2012/01/07/2nvd
- www.openwall.com/lists/oss-security/2012/01/13/8nvd
- www.tt-forums.net/viewtopic.phpnvd
News mentions
0No linked articles in our index yet.