First published: Fri Apr 26 2013(Updated: )
Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tinc VPN | <=1.0.20 | |
Tinc VPN | <=1.1 | |
Tinc VPN | =1.0.17 | |
Tinc VPN | =1.0.18 | |
Tinc VPN | =1.0.19 | |
Tinc VPN | =1.1-pre3 | |
Tinc VPN | =1.1-pre4 | |
Tinc VPN | =1.1-pre5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1428 is considered a high severity vulnerability due to its potential for denial of service and arbitrary code execution.
To fix CVE-2013-1428, update tinc to version 1.0.21 or later, or 1.1pre7 or later.
CVE-2013-1428 affects tinc versions prior to 1.0.21 and versions 1.1-pre6 and earlier.
CVE-2013-1428 is a stack-based buffer overflow vulnerability.
Yes, CVE-2013-1428 can be exploited by remote authenticated peers through the sending of a large TCP packet.