Lucene search

K
cve[email protected]CVE-2011-2903
HistorySep 02, 2011 - 4:55 p.m.

CVE-2011-2903

2011-09-0216:55:05
CWE-119
web.nvd.nist.gov
28
cve-2011-2903
heap-based buffer overflow
tcptrack
arbitrary code execution
vulnerability

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.9 High

AI Score

Confidence

Low

0.016 Low

EPSS

Percentile

87.4%

Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is “configured as a handler for other applications.” This issue might not qualify for inclusion in CVE.

Affected configurations

NVD
Node
rhythmtcptrackRange1.4.1
OR
rhythmtcptrackMatch1.0.0
OR
rhythmtcptrackMatch1.0.1
OR
rhythmtcptrackMatch1.0.2
OR
rhythmtcptrackMatch1.1
OR
rhythmtcptrackMatch1.1beta1
OR
rhythmtcptrackMatch1.1.0
OR
rhythmtcptrackMatch1.1.1
OR
rhythmtcptrackMatch1.1.2
OR
rhythmtcptrackMatch1.1.3
OR
rhythmtcptrackMatch1.1.4
OR
rhythmtcptrackMatch1.1.5
OR
rhythmtcptrackMatch1.2.0
OR
rhythmtcptrackMatch1.3.0
OR
rhythmtcptrackMatch1.4.0

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.9 High

AI Score

Confidence

Low

0.016 Low

EPSS

Percentile

87.4%