CVE-2011-2903

critical

Description

Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/69467

https://bugzilla.redhat.com/show_bug.cgi?id=729096

https://bugs.gentoo.org/show_bug.cgi?id=377917

http://www.securityfocus.com/bid/49352

http://www.rhythm.cx/~steve/devel/tcptrack/

http://www.openwall.com/lists/oss-security/2011/08/31/1

http://seclists.org/oss-sec/2011/q3/293

Details

Source: Mitre, NVD

Published: 2011-09-02

Updated: 2017-08-29

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical