MEDIUM · 6.5

CVE-2013-1428

Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or pos...

Vulnerability Description

Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.

CVSS Score

6.5

MEDIUM

AV:N/AC:L/Au:S/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
Tinc-VpnTinc<= 1.0.20

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-1428?

CVE-2013-1428 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or pos...

How severe is CVE-2013-1428?

CVE-2013-1428 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-1428?

Check the references section above for vendor advisories and patch information. Affected products include: Tinc-Vpn Tinc.