CVE-2013-1428
Tinc < 1.0.20 - Memory Corruption
Title source: ruleDescription
Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/35441
metasploit
WORKING POC
NORMAL
by Tobias Ospelt, Martin Schobert · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/vpn/tincd_bof.rb
References (12)
Scores
EPSS
0.6552
EPSS Percentile
98.5%
Details
CWE
CWE-119
Status
published
Products (6)
tinc-vpn/tinc
1.0.17
tinc-vpn/tinc
1.0.18
tinc-vpn/tinc
1.0.19
tinc-vpn/tinc
1.1 pre3 (3 CPE variants)
tinc-vpn/tinc
< 1.0.20
tinc-vpn/tinc
< 1.1
Published
Apr 26, 2013
Tracked Since
Feb 18, 2026