Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Tinc
(Tinc\-Vpn)Repositories | https://github.com/gsliepen/tinc |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2018-10-10 | CVE-2018-16737 | tinc before 1.0.30 has a broken authentication protocol, without even a partial mitigation. | Starwind_virtual_san, Tinc | 5.3 | ||
2018-10-10 | CVE-2018-16738 | tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1. | Debian_linux, Starwind_virtual_san, Tinc | 3.7 | ||
2018-10-10 | CVE-2018-16758 | Missing message authentication in the meta-protocol in Tinc VPN version 1.0.34 and earlier allows a man-in-the-middle attack to disable the encryption of VPN packets. | Debian_linux, Starwind_virtual_san, Tinc | 5.9 | ||
2013-04-26 | CVE-2013-1428 | Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet. | Tinc | N/A |