![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.801973 |
Categoría: | Buffer overflow |
Título: | Tcptrack Command Line Parsing Heap Based Buffer Overflow Vulnerability |
Resumen: | Tcptrack is prone to heap based buffer overflow vulnerability. |
Descripción: | Summary: Tcptrack is prone to heap based buffer overflow vulnerability. Vulnerability Insight: The flaw is caused due to error in command line parsing, it is not properly handling long command line argument. Vulnerability Impact: Successful exploitation allows attackers to execute arbitrary code via a long command line argument in the LWRES dissector when processing malformed data or packets. Affected Software/OS: Tcptrack version prior to 1.4.2 Solution: Upgrade to Tcptrack 1.4.2 or later. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-2903 49352 http://www.securityfocus.com/bid/49352 [oss-security] 20110809 Re: CVE request: heap overflow in tcptrack < 1.4.2 http://seclists.org/oss-sec/2011/q3/293 [oss-security] 20110831 Re: CVE request: heap overflow in tcptrack < 1.4.2 http://www.openwall.com/lists/oss-security/2011/08/31/1 http://www.rhythm.cx/~steve/devel/tcptrack/ https://bugs.gentoo.org/show_bug.cgi?id=377917 https://bugzilla.redhat.com/show_bug.cgi?id=729096 tcptrack-commandline-bo(69467) https://exchange.xforce.ibmcloud.com/vulnerabilities/69467 |
Copyright | Copyright (C) 2011 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |