Vulnerability Description
Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rhythm | Tcptrack | <= 1.4.1 |
Related Weaknesses (CWE)
References
- http://seclists.org/oss-sec/2011/q3/293
- http://www.openwall.com/lists/oss-security/2011/08/31/1
- http://www.rhythm.cx/~steve/devel/tcptrack/Patch
- http://www.securityfocus.com/bid/49352
- https://bugs.gentoo.org/show_bug.cgi?id=377917
- https://bugzilla.redhat.com/show_bug.cgi?id=729096Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69467
- http://seclists.org/oss-sec/2011/q3/293
- http://www.openwall.com/lists/oss-security/2011/08/31/1
- http://www.rhythm.cx/~steve/devel/tcptrack/Patch
- http://www.securityfocus.com/bid/49352
- https://bugs.gentoo.org/show_bug.cgi?id=377917
- https://bugzilla.redhat.com/show_bug.cgi?id=729096Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69467
FAQ
What is CVE-2011-2903?
CVE-2011-2903 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which t...
How severe is CVE-2011-2903?
CVE-2011-2903 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2903?
Check the references section above for vendor advisories and patch information. Affected products include: Rhythm Tcptrack.