Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2013-1428 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Tinc
Severity
6.5MEDIUMNVD
EPSS
65.5%
top 1.50%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 26
Latest updateMay 17
Description
Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 8.0 | Impact: 6.4
Affected Packages2 packages
🔴Vulnerability Details
3GHSA▶
GHSA-wp6j-qh23-g8mc: Stack-based buffer overflow in the receive_tcppacket function in net_packet↗2022-05-17
CVEList▶
CVE-2013-1428: Stack-based buffer overflow in the receive_tcppacket function in net_packet↗2013-04-26
OSV▶
CVE-2013-1428: Stack-based buffer overflow in the receive_tcppacket function in net_packet↗2013-04-26
💥Exploits & PoCs
1📋Vendor Advisories
1Debian▶
CVE-2013-1428: tinc - Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in...↗2013
💬Community
3Bugzilla
▶
Bugzilla▶
CVE-2013-1428 tinc: Stack-based buffer overflow when processing overly long TCP packets [fedora-all]↗2013-04-23
Bugzilla
▶