CVE-2011-2903

Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
VendorProductVersion
rhythmtcptrack
𝑥
≤ 1.4.1
rhythmtcptrack
1.0.0
rhythmtcptrack
1.0.1
rhythmtcptrack
1.0.2
rhythmtcptrack
1.1
rhythmtcptrack
1.1:beta1
rhythmtcptrack
1.1.0
rhythmtcptrack
1.1.1
rhythmtcptrack
1.1.2
rhythmtcptrack
1.1.3
rhythmtcptrack
1.1.4
rhythmtcptrack
1.1.5
rhythmtcptrack
1.2.0
rhythmtcptrack
1.3.0
rhythmtcptrack
1.4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tcptrack
bullseye
1.4.2-2
fixed
bookworm
1.4.3-1
fixed
sid
1.4.3-2
fixed
trixie
1.4.3-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tcptrack
cosmic
not-affected
bionic
not-affected
artful
ignored
zesty
ignored
yakkety
ignored
xenial
not-affected
wily
ignored
vivid
ignored
utopic
ignored
trusty
dne
saucy
ignored
raring
ignored
quantal
ignored
precise
ignored
oneiric
ignored
natty
ignored
maverick
ignored
lucid
ignored
hardy
ignored