Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1428

Опубликовано: 26 апр. 2013
Источник: ubuntu
Приоритет: low
CVSS2: 6.5

Описание

Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.

РелизСтатусПримечание
devel

not-affected

1.0.23-2
esm-apps/xenial

not-affected

1.0.23-2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1.0.23-2]]
hardy

ignored

end of life
lucid

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life

Показывать по

Ссылки на источники

6.5 Medium

CVSS2

Связанные уязвимости

nvd
почти 13 лет назад

Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.

debian
почти 13 лет назад

Stack-based buffer overflow in the receive_tcppacket function in net_p ...

github
больше 3 лет назад

Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.

fstec
почти 13 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

6.5 Medium

CVSS2