CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
87.4%
Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is “configured as a handler for other applications.” This issue might not qualify for inclusion in CVE.
Vendor | Product | Version | CPE |
---|---|---|---|
rhythm | tcptrack | * | cpe:2.3:a:rhythm:tcptrack:*:*:*:*:*:*:*:* |
rhythm | tcptrack | 1.0.0 | cpe:2.3:a:rhythm:tcptrack:1.0.0:*:*:*:*:*:*:* |
rhythm | tcptrack | 1.0.1 | cpe:2.3:a:rhythm:tcptrack:1.0.1:*:*:*:*:*:*:* |
rhythm | tcptrack | 1.0.2 | cpe:2.3:a:rhythm:tcptrack:1.0.2:*:*:*:*:*:*:* |
rhythm | tcptrack | 1.1 | cpe:2.3:a:rhythm:tcptrack:1.1:*:*:*:*:*:*:* |
rhythm | tcptrack | 1.1 | cpe:2.3:a:rhythm:tcptrack:1.1:beta1:*:*:*:*:*:* |
rhythm | tcptrack | 1.1.0 | cpe:2.3:a:rhythm:tcptrack:1.1.0:*:*:*:*:*:*:* |
rhythm | tcptrack | 1.1.1 | cpe:2.3:a:rhythm:tcptrack:1.1.1:*:*:*:*:*:*:* |
rhythm | tcptrack | 1.1.2 | cpe:2.3:a:rhythm:tcptrack:1.1.2:*:*:*:*:*:*:* |
rhythm | tcptrack | 1.1.3 | cpe:2.3:a:rhythm:tcptrack:1.1.3:*:*:*:*:*:*:* |