Описание
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | needed | |
| esm-apps/xenial | needs-triage | |
| esm-infra/bionic | needed | |
| esm-infra/focal | needed | |
| focal | ignored | end of standard support, was needed |
| jammy | needed | |
| noble | needed | |
| oracular | ignored | end of life, was needed |
| plucky | needed | |
| questing | needed |
Показывать по
7.5 High
CVSS3
Связанные уязвимости
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, th ...
iptraf-ng 1.2.1 has a stack-based buffer overflow.
7.5 High
CVSS3