Gentoo Logo

TinTin++: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201111-07 / TinTin++
Release Date November 20, 2011
Latest Revision November 20, 2011: 1
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
games-mud/tintin < 1.98.0 >= 1.98.0 All supported architectures

Related bugreports: #209903

Synopsis

Multiple vulnerabilities have been reported in TinTin++ which could allow a remote attacker to conduct several attacks, including the execution of arbitrary code and Denial of Service.

2.  Impact Information

Background

TinTin++ is a free MUD gaming client.

Description

Multiple vulnerabilities have been discovered in TinTin++. Please review the CVE identifiers referenced below for details.

Impact

Remote unauthenticated attackers may be able to execute arbitrary code with the privileges of the TinTin++ process, cause a Denial of Service, or truncate arbitrary files in the top level of the home directory belonging to the user running the TinTin++ process.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All TinTin++ users should upgrade to the latest stable version:

Code Listing 3.1: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=games-mud/tintin-1.98.0"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since March 25, 2008. It is likely that your system is already no longer affected by this issue.

4.  References



Print

Page updated November 20, 2011

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.