Description
Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, does not perform input validation before logging information fields taken from packets from a remote peer, which allows remote attackers to generate crafted log entries, and possibly avoid detection of attacks, via modified (1) computer name, (2) user name, and (3) IP address fields.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Core Security · pythonremotewindows
https://www.exploit-db.com/exploits/5238
References (7)
Core 7
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29316
Various Sources x_refsource_misc
http://www.coresecurity.com/?action=item&id=2166
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3742
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28081
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41330
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/489414/100/0/threaded
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5238
Scores
EPSS
0.1082
EPSS Percentile
93.4%
Details
CWE
CWE-20
Status
published
Products (1)
netopia/timbuktu_pro
8.6.5
Published
Mar 14, 2008
Tracked Since
Feb 18, 2026