Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2013-1428Improper Restriction of Operations within the Bounds of a Memory Buffer in Tinc

Severity
6.5MEDIUMNVD
EPSS
65.5%
top 1.50%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 26
Latest updateMay 17

Description

Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 8.0 | Impact: 6.4

Affected Packages2 packages

Debiantinc/tinc< 1.0.19-3+3
NVDtinc-vpn/tinc1.0.20+5

🔴Vulnerability Details

3
GHSA
GHSA-wp6j-qh23-g8mc: Stack-based buffer overflow in the receive_tcppacket function in net_packet2022-05-17
CVEList
CVE-2013-1428: Stack-based buffer overflow in the receive_tcppacket function in net_packet2013-04-26
OSV
CVE-2013-1428: Stack-based buffer overflow in the receive_tcppacket function in net_packet2013-04-26

💥Exploits & PoCs

1
Exploit-DB
Tincd - (Authenticated) Remote TCP Stack Buffer Overflow (Metasploit)2014-12-02

📋Vendor Advisories

1
Debian
CVE-2013-1428: tinc - Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in...2013

💬Community

3
Bugzilla
CVE-2013-2186 Apache commons-fileupload: Arbitrary file upload via deserialization2013-06-16
Bugzilla
CVE-2013-1428 tinc: Stack-based buffer overflow when processing overly long TCP packets [fedora-all]2013-04-23
Bugzilla
CVE-2013-1428 tinc: Stack-based buffer overflow when processing overly long TCP packets2013-04-23
CVE-2013-1428 — Tinc-vpn Tinc vulnerability | cvebase