Executive Summary

Informations
NameCVE-2019-7629First vendor Publication2019-02-18
VendorCveLast vendor Modification2019-02-19

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7629

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Application1

Sources (Detail)

SourceUrl
MISC https://tintin.sourceforge.io/forum/viewtopic.php?f=1&t=2584&sid=31b7...
https://tintin.sourceforge.io/news.php
https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-02-20 12:09:50
  • Multiple Updates
2019-02-19 12:01:12
  • First insertion