Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://tintin.sourceforge.io/forum/viewtopic.php?f=1&t=2584&sid=31b77bb001faea9269bf224280960e29#p10505 | third party advisory |
https://tintin.sourceforge.io/news.php | third party advisory product |
https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/ | third party advisory exploit |