CVE-2008-1118

Timbuktu Pro <8.7 - Info Disclosure

Title source: llm
STIX 2.1

Description

Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, does not perform input validation before logging information fields taken from packets from a remote peer, which allows remote attackers to generate crafted log entries, and possibly avoid detection of attacks, via modified (1) computer name, (2) user name, and (3) IP address fields.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Core Security · pythonremotewindows
https://www.exploit-db.com/exploits/5238

References (7)

Core 7
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29316
Various Sources x_refsource_misc
http://www.coresecurity.com/?action=item&id=2166
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3742
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28081
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41330
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/489414/100/0/threaded
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5238

Scores

EPSS 0.1082
EPSS Percentile 93.4%

Details

CWE
CWE-20
Status published
Products (1)
netopia/timbuktu_pro 8.6.5
Published Mar 14, 2008
Tracked Since Feb 18, 2026