Executive Summary

Summary
Title TinTin++: Multiple vulnerabilities
Informations
Name GLSA-201111-07 First vendor Publication 2011-11-20
Vendor Gentoo Last vendor Modification 2011-11-20
Severity (Vendor) High Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

Multiple vulnerabilities have been reported in TinTin++ which could allow a remote attacker to conduct several attacks, including the execution of arbitrary code and Denial of Service.

Background

TinTin++ is a free MUD gaming client.

Description

Multiple vulnerabilities have been discovered in TinTin++. Please review the CVE identifiers referenced below for details.

Impact

Remote unauthenticated attackers may be able to execute arbitrary code with the privileges of the TinTin++ process, cause a Denial of Service, or truncate arbitrary files in the top level of the home directory belonging to the user running the TinTin++ process.

Workaround

There is no known workaround at this time.

Resolution

All TinTin++ users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=games-mud/tintin-1.98.0"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since March 25, 2008. It is likely that your system is already no longer affected by this issue.

References

[ 1 ] CVE-2008-0671 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0671
[ 2 ] CVE-2008-0672 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0672
[ 3 ] CVE-2008-0673 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0673

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201111-07.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-201111-07.xml

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
50 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1

OpenVAS Exploits

Date Description
2012-02-12 Name : Gentoo Security Advisory GLSA 201111-07 (TinTin++)
File : nvt/glsa_201111_07.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
42872 TinTin++ / WinTin++ Inbound File Transfer Request Arbitrary File Truncation

42871 TinTin++ / WinTin++ process_chat_input Function YES Message Newline DoS

42870 TinTin++ / WinTin++ add_line_buffer Function Chat Message LF Conversion Remot...

Nessus® Vulnerability Scanner

Date Description
2011-11-22 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201111-07.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:37:06
  • Multiple Updates