Описание
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | iptraf-ng | Not affected | ||
Red Hat Enterprise Linux 7 | iptraf-ng | Out of support scope | ||
Red Hat Enterprise Linux 8 | iptraf-ng | Out of support scope | ||
Red Hat Enterprise Linux 9 | iptraf-ng | Fixed | RHSA-2025:7064 | 13.05.2025 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.6 Medium
CVSS3
Связанные уязвимости
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, th ...
iptraf-ng 1.2.1 has a stack-based buffer overflow.
EPSS
6.6 Medium
CVSS3