Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, does not perform input validation before logging information fields taken from packets from a remote peer, which allows remote attackers to generate crafted log entries, and possibly avoid detection of attacks, via modified (1) computer name, (2) user name, and (3) IP address fields.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T08:08:57.492Z
Reserved: 2008-03-03T00:00:00
Link: CVE-2008-1118

No data.

Status : Modified
Published: 2008-03-14T20:44:00.000
Modified: 2024-11-21T00:43:43.157
Link: CVE-2008-1118

No data.