Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
References
Link | Resource |
---|---|
https://tintin.sourceforge.io/forum/viewtopic.php?f=1&t=2584&sid=31b77bb001faea9269bf224280960e29#p10505 | Third Party Advisory |
https://tintin.sourceforge.io/news.php | Product Third Party Advisory |
https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/ | Exploit Third Party Advisory |
https://tintin.sourceforge.io/forum/viewtopic.php?f=1&t=2584&sid=31b77bb001faea9269bf224280960e29#p10505 | Third Party Advisory |
https://tintin.sourceforge.io/news.php | Product Third Party Advisory |
https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://tintin.sourceforge.io/forum/viewtopic.php?f=1&t=2584&sid=31b77bb001faea9269bf224280960e29#p10505 - Third Party Advisory | |
References | () https://tintin.sourceforge.io/news.php - Product, Third Party Advisory | |
References | () https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/ - Exploit, Third Party Advisory |
Information
Published : 2019-02-18 20:29
Updated : 2024-11-21 04:48
NVD link : CVE-2019-7629
Mitre link : CVE-2019-7629
CVE.ORG link : CVE-2019-7629
JSON object : View
Products Affected
tintin\+\+_project
- wintin\+\+
- tintin\+\+
CWE
CWE-787
Out-of-bounds Write