Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-0671

Опубликовано: 12 фев. 2008
Источник: debian
EPSS Средний

Описание

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tintin++fixed1.97.9-2package
tintin++no-dsaetchpackage

EPSS

Процентиль: 94%
0.15713
Средний

Связанные уязвимости

ubuntu
почти 18 лет назад

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

nvd
почти 18 лет назад

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

github
больше 3 лет назад

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

EPSS

Процентиль: 94%
0.15713
Средний