Описание
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | iptraf-ng | Not affected | ||
| Red Hat Enterprise Linux 7 | iptraf-ng | Out of support scope | ||
| Red Hat Enterprise Linux 8 | iptraf-ng | Out of support scope | ||
| Red Hat Enterprise Linux 9 | iptraf-ng | Fixed | RHSA-2025:7064 | 13.05.2025 |
Показывать по
10
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2332702iptraf-ng: buffer overflow via ifaces.c
6.6 Medium
CVSS3
Связанные уязвимости
CVSS3: 7.5
ubuntu
около 1 года назад
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
CVSS3: 7.5
nvd
около 1 года назад
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
CVSS3: 7.5
debian
около 1 года назад
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, th ...
6.6 Medium
CVSS3