Off-by-one error in TIN 1.8.0 and earlier might allow attackers to execute arbitrary code via unknown vectors that trigger a buffer overflow.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-200611-18.xml | vendor advisory |
http://www.novell.com/linux/security/advisories/2006_05_sr.html | vendor advisory |
http://www.vupen.com/english/advisories/2006/0702 | vdb entry |
http://www.openpkg.org/security/OpenPKG-SA-2006.005-tin.html | vendor advisory |
http://secunia.com/advisories/19130 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24841 | vdb entry |
http://www.securityfocus.com/bid/16728 | vdb entry |