Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Gentoo Security Advisory GLSA 201111-07 (TinTin++)

Information

Severity

Severity

Critical

Family

Family

Gentoo Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

12 years ago

Modified

Modified

5 years ago

Summary

The remote host is missing updates announced in advisory GLSA 201111-07.

Insight

Insight

Multiple vulnerabilities have been reported in TinTin++ which could allow a remote attacker to conduct several attacks, including the execution of arbitrary code and Denial of Service.

Solution

Solution

All TinTin++ users should upgrade to the latest stable version: # emerge --sync # emerge --ask --oneshot --verbose '>=games-mud/tintin-1.98.0' NOTE: This is a legacy GLSA. Updates for all affected architectures are available since March 25, 2008. It is likely that your system is already no longer affected by this issue.

Common Vulnerabilities and Exposures (CVE)