CVE-2011-2903
Published Sep 2, 2011
Last updated 7 years ago
Overview
- Description
- Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rhythm:tcptrack:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE8F756F-F479-47F9-B9CD-32C84DECB62D", "versionEndIncluding": "1.4.1" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0505E0D4-EE25-40CC-8498-B750F6EA1706" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4ACCB71-8703-42B8-B2A4-254638342B78" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "868D560B-411D-4D92-8972-2820DFE26017" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34162318-DCDC-49CA-932C-39EF6BFA8797" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.1:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A122080-F32A-4913-B59B-2137C62A5DD3" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD68EA3E-BB47-4CF2-BC1D-2E87066DAFBD" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C0C1E91-CE04-4CBF-9BA6-B6F844B2D881" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85BE6467-BDD4-41B0-8BE3-3EF8DC482B10" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "341F8D6F-7A5B-4906-9F93-D9096CBEBDAD" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3E3C0AF-2CF2-4E86-AAAE-817D5F9FBAE7" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E40367CA-1996-494F-935B-2956B97B2036" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EC7E8B2-835F-481B-AD71-FB7F1D94F80E" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D247729A-CC40-488C-963A-B7C545C1AFAC" }, { "criteria": "cpe:2.3:a:rhythm:tcptrack:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86D43D1A-EAA2-4B84-9A0A-5151C07D5B4C" } ], "operator": "OR" } ] } ]