CVE-2019-7629

Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tintin\+\+_project:tintin\+\+:2.01.6:*:*:*:*:*:*:*
cpe:2.3:a:tintin\+\+_project:wintin\+\+:2.01.6:*:*:*:*:*:*:*

History

21 Nov 2024, 04:48

Type Values Removed Values Added
References () https://tintin.sourceforge.io/forum/viewtopic.php?f=1&t=2584&sid=31b77bb001faea9269bf224280960e29#p10505 - Third Party Advisory () https://tintin.sourceforge.io/forum/viewtopic.php?f=1&t=2584&sid=31b77bb001faea9269bf224280960e29#p10505 - Third Party Advisory
References () https://tintin.sourceforge.io/news.php - Product, Third Party Advisory () https://tintin.sourceforge.io/news.php - Product, Third Party Advisory
References () https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/ - Exploit, Third Party Advisory () https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/ - Exploit, Third Party Advisory

Information

Published : 2019-02-18 20:29

Updated : 2024-11-21 04:48


NVD link : CVE-2019-7629

Mitre link : CVE-2019-7629

CVE.ORG link : CVE-2019-7629


JSON object : View

Products Affected

tintin\+\+_project

  • wintin\+\+
  • tintin\+\+
CWE
CWE-787

Out-of-bounds Write