7.5
CVSSv2

CVE-2008-1118

Published: 14/03/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, does not perform input validation before logging information fields taken from packets from a remote peer, which allows remote malicious users to generate crafted log entries, and possibly avoid detection of attacks, via modified (1) computer name, (2) user name, and (3) IP address fields.

Vulnerable Product Search on Vulmon Subscribe to Product

netopia timbuktu pro 8.6.5

Exploits

# Core Security Technologies - CoreLabs Advisory # wwwcoresecuritycom/corelabs # Title: Timbuktu Pro Remote Path Traversal and Log Injection # Advisory ID: CORE-2008-0204 # Advisory URL: wwwcoresecuritycom/?action=item&id=2166 # Date published: 2008-03-11 # Date of last update: 2008-03-11 # Vendors contacted: Motorola # Rele ...
Core Security Technologies Advisory - Timbuktu Pro suffers from remote path traversal and log injection vulnerabilities ...