Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
References
Link | Resource |
---|---|
https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/ | Exploit Third Party Advisory |
https://tintin.sourceforge.io/news.php | Product Third Party Advisory |
https://tintin.sourceforge.io/forum/viewtopic.php?f=1&t=2584&sid=31b77bb001faea9269bf224280960e29#p10505 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-02-18 12:29
Updated : 2020-08-24 10:37
NVD link : CVE-2019-7629
Mitre link : CVE-2019-7629
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
tintin\+\+_project
- wintin\+\+
- tintin\+\+