Vulnerability Description
Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tinc-Vpn | Tinc | <= 1.0.20 |
Related Weaknesses (CWE)
References
- http://freecode.com/projects/tinc/releases/354122
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105531.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105559.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106167.html
- http://osvdb.org/92653
- http://secunia.com/advisories/53087Vendor Advisory
- http://secunia.com/advisories/53108Vendor Advisory
- http://www.debian.org/security/2013/dsa-2663
- http://www.securityfocus.com/bid/59369
- http://www.tinc-vpn.org/news/
- http://www.tinc-vpn.org/pipermail/tinc/2013-April/003240.htmlVendor Advisory
- https://github.com/gsliepen/tinc/commit/17a33dfd95b1a29e90db76414eb9622df9632320
- http://freecode.com/projects/tinc/releases/354122
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105531.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105559.html
FAQ
What is CVE-2013-1428?
CVE-2013-1428 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or pos...
How severe is CVE-2013-1428?
CVE-2013-1428 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1428?
Check the references section above for vendor advisories and patch information. Affected products include: Tinc-Vpn Tinc.