[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Heap-based buffer overflow in tcptrack when tcptrack is configured as a handler for other applications (dpkg)

ID: oval:org.secpod.oval:def:3554Date: (C)2011-12-23   (M)2021-06-02
Class: VULNERABILITYFamily: unix




The host is installed with tcptrack before 1.4.2 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long command line argument. Successful exploitation could allow attackers to execute arbitrary code.

Platform:
Linux
Product:
Tcptrack
Reference:
CVE-2011-2903
CVE    1
CVE-2011-2903
CPE    1
cpe:/a:rhythm:tcptrack

© SecPod Technologies