CVE-2011-2903
02.09.2011, 16:55
Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.Enginsight
Vendor | Product | Version |
---|---|---|
rhythm | tcptrack | 𝑥 ≤ 1.4.1 |
rhythm | tcptrack | 1.0.0 |
rhythm | tcptrack | 1.0.1 |
rhythm | tcptrack | 1.0.2 |
rhythm | tcptrack | 1.1 |
rhythm | tcptrack | 1.1:beta1 |
rhythm | tcptrack | 1.1.0 |
rhythm | tcptrack | 1.1.1 |
rhythm | tcptrack | 1.1.2 |
rhythm | tcptrack | 1.1.3 |
rhythm | tcptrack | 1.1.4 |
rhythm | tcptrack | 1.1.5 |
rhythm | tcptrack | 1.2.0 |
rhythm | tcptrack | 1.3.0 |
rhythm | tcptrack | 1.4.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References