Описание
Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 1.4.2-1build1 |
| cosmic | not-affected | 1.4.2-1build1 |
| devel | not-affected | 1.4.2-1build1 |
| esm-apps/bionic | not-affected | 1.4.2-1build1 |
| esm-apps/xenial | not-affected | 1.4.2-1build1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [1.4.2-1build1]] |
| hardy | ignored | end of life |
| lucid | ignored | end of life |
| maverick | ignored | end of life |
Показывать по
Ссылки на источники
6.8 Medium
CVSS2
Связанные уязвимости
Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
Heap-based buffer overflow in tcptrack before 1.4.2 might allow attack ...
Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
6.8 Medium
CVSS2