CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
0.4%
Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.
Vendor | Product | Version | CPE |
---|---|---|---|
jeremy_elson | tcpflow | 0.10 | cpe:2.3:a:jeremy_elson:tcpflow:0.10:*:*:*:*:*:*:* |
jeremy_elson | tcpflow | 0.11 | cpe:2.3:a:jeremy_elson:tcpflow:0.11:*:*:*:*:*:*:* |
jeremy_elson | tcpflow | 0.12 | cpe:2.3:a:jeremy_elson:tcpflow:0.12:*:*:*:*:*:*:* |
jeremy_elson | tcpflow | 0.20 | cpe:2.3:a:jeremy_elson:tcpflow:0.20:*:*:*:*:*:*:* |