CVE-2013-1428

Tinc < 1.0.20 - Memory Corruption

Title source: rule

Description

Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/35441
metasploit WORKING POC NORMAL
by Tobias Ospelt, Martin Schobert · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/vpn/tincd_bof.rb

Scores

EPSS 0.6552
EPSS Percentile 98.5%

Details

CWE
CWE-119
Status published
Products (6)
tinc-vpn/tinc 1.0.17
tinc-vpn/tinc 1.0.18
tinc-vpn/tinc 1.0.19
tinc-vpn/tinc 1.1 pre3 (3 CPE variants)
tinc-vpn/tinc < 1.0.20
tinc-vpn/tinc < 1.1
Published Apr 26, 2013
Tracked Since Feb 18, 2026