CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
98.8%
Nicolas Ruff discovered that iTALC had buffer overflows, divide-by-zero errors
and didn’t check malloc return values. A remote attacker could use these issues
to cause a denial of service or possibly execute arbitrary code.
(CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054, CVE-2014-6055)
Josef Gajdusek discovered that iTALC had heap-based buffer overflow
vulnerabilities. A remote attacker could used these issues to cause a denial of
service or possibly execute arbitrary code. (CVE-2016-9941, CVE-2016-9942)
It was discovered that iTALC had an out-of-bounds write, multiple heap
out-of-bounds writes, an infinite loop, improper initializations, and null
pointer vulnerabilities. A remote attacker could used these issues to cause a
denial of service or possibly execute arbitrary code. (CVE-2018-15127,
CVE-2018-20019, CVE-2018-20020, CVE-2018-20021, CVE-2018-20022, CVE-2018-20023,
CVE-2018-20024, CVE-2018-20748, CVE-2018-20749, CVE-2018-20750, CVE-2018-7225,
CVE-2019-15681)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | italc-client | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | italc-client-dbg | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | italc-client-dbgsym | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | italc-management-console | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | italc-management-console-dbg | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | italc-management-console-dbgsym | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | italc-master | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | italc-master-dbg | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | italc-master-dbgsym | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libitalccore | < 1:2.0.2+dfsg1-4ubuntu0.1 | UNKNOWN |
ubuntu.com/security/CVE-2014-6051
ubuntu.com/security/CVE-2014-6052
ubuntu.com/security/CVE-2014-6053
ubuntu.com/security/CVE-2014-6054
ubuntu.com/security/CVE-2014-6055
ubuntu.com/security/CVE-2016-9941
ubuntu.com/security/CVE-2016-9942
ubuntu.com/security/CVE-2018-15127
ubuntu.com/security/CVE-2018-20019
ubuntu.com/security/CVE-2018-20020
ubuntu.com/security/CVE-2018-20021
ubuntu.com/security/CVE-2018-20022
ubuntu.com/security/CVE-2018-20023
ubuntu.com/security/CVE-2018-20024
ubuntu.com/security/CVE-2018-20748
ubuntu.com/security/CVE-2018-20749
ubuntu.com/security/CVE-2018-20750
ubuntu.com/security/CVE-2018-7225
ubuntu.com/security/CVE-2019-15681
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
98.8%