Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.801973
Category:Buffer overflow
Title:Tcptrack Command Line Parsing Heap Based Buffer Overflow Vulnerability
Summary:Tcptrack is prone to heap based buffer overflow vulnerability.
Description:Summary:
Tcptrack is prone to heap based buffer overflow vulnerability.

Vulnerability Insight:
The flaw is caused due to error in command line parsing, it is not properly
handling long command line argument.

Vulnerability Impact:
Successful exploitation allows attackers to execute arbitrary code via a long
command line argument in the LWRES dissector when processing malformed data
or packets.

Affected Software/OS:
Tcptrack version prior to 1.4.2

Solution:
Upgrade to Tcptrack 1.4.2 or later.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-2903
49352
http://www.securityfocus.com/bid/49352
[oss-security] 20110809 Re: CVE request: heap overflow in tcptrack < 1.4.2
http://seclists.org/oss-sec/2011/q3/293
[oss-security] 20110831 Re: CVE request: heap overflow in tcptrack < 1.4.2
http://www.openwall.com/lists/oss-security/2011/08/31/1
http://www.rhythm.cx/~steve/devel/tcptrack/
https://bugs.gentoo.org/show_bug.cgi?id=377917
https://bugzilla.redhat.com/show_bug.cgi?id=729096
tcptrack-commandline-bo(69467)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69467
CopyrightCopyright (C) 2011 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.