6.5
CVSSv2

CVE-2013-1428

Published: 26/04/2013 Updated: 01/12/2013
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc prior to 1.0.21 and 1.1 prior to 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.

Vulnerable Product Search on Vulmon Subscribe to Product

tinc-vpn tinc 1.0.18

tinc-vpn tinc 1.0.17

tinc-vpn tinc

tinc-vpn tinc 1.0.19

tinc-vpn tinc 1.1

Vendor Advisories

Martin Schobert discovered a stack-based vulnerability in tinc, a Virtual Private Network (VPN) daemon When packets are forwarded via TCP, packet length is not checked against the stack buffer length Authenticated peers could use this to crash the tinc daemon and maybe execute arbitrary code Note that on Wheezy and Sid, tinc is built using harde ...

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'securerandom' class Metasploit3 < Msf::Exploit::Remote Rank = AverageRanking include Msf::Exploit::EXE include Msf::Exploit::Remote::TincdExploitClient def initialize(inf ...