The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue.
bugs.openttd.org/task/3909
bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch
lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html
lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html
osvdb.org/66503
secunia.com/advisories/40630
secunia.com/advisories/40760
security.openttd.org/en/CVE-2010-2534
www.openwall.com/lists/oss-security/2010/07/20/1
www.securityfocus.com/bid/41804
www.vupen.com/english/advisories/2010/1888
www.vupen.com/english/advisories/2010/1916
exchange.xforce.ibmcloud.com/vulnerabilities/60568