Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-0672

Опубликовано: 12 фев. 2008
Источник: debian
EPSS Низкий

Описание

The process_chat_input function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to cause a denial of service (application crash) via a YES message without a newline character, which triggers a NULL dereference.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tintin++fixed1.97.9-2package
tintin++no-dsaetchpackage

EPSS

Процентиль: 78%
0.0119
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

The process_chat_input function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to cause a denial of service (application crash) via a YES message without a newline character, which triggers a NULL dereference.

nvd
почти 18 лет назад

The process_chat_input function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to cause a denial of service (application crash) via a YES message without a newline character, which triggers a NULL dereference.

github
больше 3 лет назад

The process_chat_input function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to cause a denial of service (application crash) via a YES message without a newline character, which triggers a NULL dereference.

EPSS

Процентиль: 78%
0.0119
Низкий