Описание
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
Релиз | Статус | Примечание |
---|---|---|
devel | needed | |
esm-apps/xenial | needs-triage | |
esm-infra/bionic | needed | |
esm-infra/focal | needed | |
focal | ignored | end of standard support, was needed |
jammy | needed | |
noble | needed | |
oracular | ignored | end of life, was needed |
plucky | needed | |
upstream | needs-triage |
Показывать по
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, th ...
iptraf-ng 1.2.1 has a stack-based buffer overflow.
EPSS
9.8 Critical
CVSS3