CVE-2013-1428
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
26/04/2013
Last modified:
11/04/2025
Description
Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:tinc-vpn:tinc:*:*:*:*:*:*:*:* | 1.0.20 (including) | |
cpe:2.3:a:tinc-vpn:tinc:*:pre6:*:*:*:*:*:* | 1.1 (including) | |
cpe:2.3:a:tinc-vpn:tinc:1.0.17:*:*:*:*:*:*:* | ||
cpe:2.3:a:tinc-vpn:tinc:1.0.18:*:*:*:*:*:*:* | ||
cpe:2.3:a:tinc-vpn:tinc:1.0.19:*:*:*:*:*:*:* | ||
cpe:2.3:a:tinc-vpn:tinc:1.1:pre3:*:*:*:*:*:* | ||
cpe:2.3:a:tinc-vpn:tinc:1.1:pre4:*:*:*:*:*:* | ||
cpe:2.3:a:tinc-vpn:tinc:1.1:pre5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://freecode.com/projects/tinc/releases/354122
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105531.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105559.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106167.html
- http://osvdb.org/92653
- http://secunia.com/advisories/53087
- http://secunia.com/advisories/53108
- http://www.debian.org/security/2013/dsa-2663
- http://www.securityfocus.com/bid/59369
- http://www.tinc-vpn.org/news/
- http://www.tinc-vpn.org/pipermail/tinc/2013-April/003240.html
- https://github.com/gsliepen/tinc/commit/17a33dfd95b1a29e90db76414eb9622df9632320
- http://freecode.com/projects/tinc/releases/354122
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105531.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105559.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106167.html
- http://osvdb.org/92653
- http://secunia.com/advisories/53087
- http://secunia.com/advisories/53108
- http://www.debian.org/security/2013/dsa-2663
- http://www.securityfocus.com/bid/59369
- http://www.tinc-vpn.org/news/
- http://www.tinc-vpn.org/pipermail/tinc/2013-April/003240.html
- https://github.com/gsliepen/tinc/commit/17a33dfd95b1a29e90db76414eb9622df9632320