CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
84.4%
Off-by-one error in TIN 1.8.0 and earlier might allow attackers to execute arbitrary code via unknown vectors that trigger a buffer overflow.
Vendor | Product | Version | CPE |
---|---|---|---|
tin | tin | 1.0_pl0 | cpe:2.3:a:tin:tin:1.0_pl0:*:*:*:*:*:*:* |
tin | tin | 1.0_pl1 | cpe:2.3:a:tin:tin:1.0_pl1:*:*:*:*:*:*:* |
tin | tin | 1.0_pl2 | cpe:2.3:a:tin:tin:1.0_pl2:*:*:*:*:*:*:* |
tin | tin | 1.0_pl3 | cpe:2.3:a:tin:tin:1.0_pl3:*:*:*:*:*:*:* |
tin | tin | 1.0_pl4 | cpe:2.3:a:tin:tin:1.0_pl4:*:*:*:*:*:*:* |
tin | tin | 1.0_pl5 | cpe:2.3:a:tin:tin:1.0_pl5:*:*:*:*:*:*:* |
tin | tin | 1.1_pl0 | cpe:2.3:a:tin:tin:1.1_pl0:*:*:*:*:*:*:* |
tin | tin | 1.1_pl1 | cpe:2.3:a:tin:tin:1.1_pl1:*:*:*:*:*:*:* |
tin | tin | 1.1_pl2 | cpe:2.3:a:tin:tin:1.1_pl2:*:*:*:*:*:*:* |
tin | tin | 1.1_pl3 | cpe:2.3:a:tin:tin:1.1_pl3:*:*:*:*:*:*:* |
secunia.com/advisories/19130
security.gentoo.org/glsa/glsa-200611-18.xml
www.novell.com/linux/security/advisories/2006_05_sr.html
www.openpkg.org/security/OpenPKG-SA-2006.005-tin.html
www.securityfocus.com/bid/16728
www.vupen.com/english/advisories/2006/0702
exchange.xforce.ibmcloud.com/vulnerabilities/24841