CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS
Percentile
87.4%
Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is “configured as a handler for other applications.” This issue might not qualify for inclusion in CVE.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | tcptrack | < 1.4.2-1 | tcptrack_1.4.2-1_all.deb |
Debian | 11 | all | tcptrack | < 1.4.2-1 | tcptrack_1.4.2-1_all.deb |
Debian | 999 | all | tcptrack | < 1.4.2-1 | tcptrack_1.4.2-1_all.deb |
Debian | 13 | all | tcptrack | < 1.4.2-1 | tcptrack_1.4.2-1_all.deb |