blob: 9effd86ff0deb367cc21f2a8ea588409879f4355 [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201111-07">
<title>TinTin++: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been reported in TinTin++ which could
allow a remote attacker to conduct several attacks, including the execution
of arbitrary code and Denial of Service.
<product type="ebuild">TinTin++</product>
<announced>November 20, 2011</announced>
<revised>November 20, 2011: 1</revised>
<package name="games-mud/tintin" auto="yes" arch="*">
<unaffected range="ge">1.98.0</unaffected>
<vulnerable range="lt">1.98.0</vulnerable>
<p>TinTin++ is a free MUD gaming client.</p>
<p>Multiple vulnerabilities have been discovered in TinTin++. Please review
the CVE identifiers referenced below for details.
<impact type="high">
<p>Remote unauthenticated attackers may be able to execute arbitrary code
with the privileges of the TinTin++ process, cause a Denial of Service,
or truncate arbitrary files in the top level of the home directory
belonging to the user running the TinTin++ process.
<p>There is no known workaround at this time.</p>
<p>All TinTin++ users should upgrade to the latest stable version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=games-mud/tintin-1.98.0"
<p>NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since March 25, 2008. It is likely that your system is already
no longer affected by this issue.
<uri link="">CVE-2008-0671</uri>
<uri link="">CVE-2008-0672</uri>
<uri link="">CVE-2008-0673</uri>
<metadata timestamp="Fri, 07 Oct 2011 23:37:02 +0000" tag="requester">system</metadata>
<metadata timestamp="Sun, 20 Nov 2011 17:56:45 +0000" tag="submitter">ackle</metadata>