Package: tintin++
Version: 1.97.9-1
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for tintin++.

CVE-2008-0673[0]:
| TinTin++ 1.97.9 and WinTin++ 1.97.9 open files on the basis of an
| inbound file-transfer request, before the user has an opportunity to
| decline the request, which allows remote attackers to truncate
| arbitrary files in the top level of a home directory.

CVE-2008-0672[1]:
| The process_chat_input function in TinTin++ 1.97.9 and WinTin++ 1.97.9
| allows remote attackers to cause a denial of service (application
| crash) via a YES message without a newline character, which triggers a
| NULL dereference.

CVE-2008-0671[2]:
| Stack-based buffer overflow in the add_line_buffer function in
| TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute
| arbitrary code via a long chat message, related to conversion from LF
| to CRLF.

If you fix these vulnerabilities please also include the CVE ids
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0673
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0672
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0671

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgp2XDbQB1e0A.pgp
Description: PGP signature

Reply via email to