First published: Mon Dec 31 2001(Updated: )
tinc 1.0pre3 and 1.0pre4 allows remote attackers to inject data into user sessions by sniffing and replaying packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tinc VPN | =1.0pre4 | |
Tinc VPN | =1.0pre3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1505 is considered to have a medium severity due to the potential for session hijacking through packet replay attacks.
To mitigate CVE-2001-1505, upgrade to a patched version of Tinc VPN that addresses this vulnerability.
CVE-2001-1505 affects Tinc VPN versions 1.0pre3 and 1.0pre4.
Yes, CVE-2001-1505 can be exploited remotely by attackers who can sniff and replay packets.
The potential risks of CVE-2001-1505 include unauthorized access to user sessions and data interception.