CVE-2013-1428

Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tinc-vpn:tinc:*:*:*:*:*:*:*:*
cpe:2.3:a:tinc-vpn:tinc:*:pre6:*:*:*:*:*:*
cpe:2.3:a:tinc-vpn:tinc:1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:tinc-vpn:tinc:1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:tinc-vpn:tinc:1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:tinc-vpn:tinc:1.1:pre3:*:*:*:*:*:*
cpe:2.3:a:tinc-vpn:tinc:1.1:pre4:*:*:*:*:*:*
cpe:2.3:a:tinc-vpn:tinc:1.1:pre5:*:*:*:*:*:*

History

No history.

Information

Published : 2013-04-26 16:55

Updated : 2024-02-04 18:16


NVD link : CVE-2013-1428

Mitre link : CVE-2013-1428

CVE.ORG link : CVE-2013-1428


JSON object : View

Products Affected

tinc-vpn

  • tinc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer