Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, does not perform input validation before logging information fields taken from packets from a remote peer, which allows remote attackers to generate crafted log entries, and possibly avoid detection of attacks, via modified (1) computer name, (2) user name, and (3) IP address fields.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2008-03-14T20:00:00
Updated: 2024-08-07T08:08:57.492Z
Reserved: 2008-03-03T00:00:00
Link: CVE-2008-1118
Vulnrichment
No data.
NVD
Status : Modified
Published: 2008-03-14T20:44:00.000
Modified: 2024-11-21T00:43:43.157
Link: CVE-2008-1118
Redhat
No data.