Package: tintin++ Version: 1.97.9-1 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for tintin++.
CVE-2008-0673[0]: | TinTin++ 1.97.9 and WinTin++ 1.97.9 open files on the basis of an | inbound file-transfer request, before the user has an opportunity to | decline the request, which allows remote attackers to truncate | arbitrary files in the top level of a home directory. CVE-2008-0672[1]: | The process_chat_input function in TinTin++ 1.97.9 and WinTin++ 1.97.9 | allows remote attackers to cause a denial of service (application | crash) via a YES message without a newline character, which triggers a | NULL dereference. CVE-2008-0671[2]: | Stack-based buffer overflow in the add_line_buffer function in | TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute | arbitrary code via a long chat message, related to conversion from LF | to CRLF. If you fix these vulnerabilities please also include the CVE ids in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0673 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0672 [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0671 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgp2XDbQB1e0A.pgp
Description: PGP signature