{"id":"UBUNTU-CVE-2012-5645","details":"A denial of service flaw was found in the way the server component of Freeciv before 2.3.4 processed certain packets. A remote attacker could send a specially-crafted packet that, when processed would lead to memory exhaustion or excessive CPU consumption.","modified":"2025-07-16T07:31:03.189015Z","published":"2019-12-30T20:15:00Z","withdrawn":"2025-07-18T16:42:48Z","upstream":["CVE-2012-5645"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2012-5645"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2012/12/18"},{"type":"REPORT","url":"http://aluigi.altervista.org/adv/freecivet-adv.txt"},{"type":"REPORT","url":"http://freeciv.wikia.com/wiki/NEWS-2.3.3"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2012-5645"}],"affected":[{"package":{"name":"freeciv","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/freeciv@2.4.2-1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.2-1"}]}],"versions":["2.3.4-1","2.4.0-1","2.4.1-1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"freeciv-client-extras","binary_version":"2.4.2-1"},{"binary_name":"freeciv-client-gtk","binary_version":"2.4.2-1"},{"binary_name":"freeciv-client-sdl","binary_version":"2.4.2-1"},{"binary_name":"freeciv-client-xaw3d","binary_version":"2.4.2-1"},{"binary_name":"freeciv-data","binary_version":"2.4.2-1"},{"binary_name":"freeciv-server","binary_version":"2.4.2-1"},{"binary_name":"freeciv-sound-standard","binary_version":"2.4.2-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-5645.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}