First published: Sat Aug 04 2018(Updated: )
An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during caplen processing. If the caplen is less than 144, one can cause an integer overflow in the function handle_80211, which will result in an out-of-bounds read and may allow access to sensitive memory (or a denial of service).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/tcpflow | <1.4.5+ | 1.4.5+ |
ubuntu/tcpflow | <1.4.5+ | 1.4.5+ |
ubuntu/tcpflow | <1.5.0+ | 1.5.0+ |
ubuntu/tcpflow | <1.4.5+ | 1.4.5+ |
ubuntu/tcpflow | <1.4.4+ | 1.4.4+ |
<=1.4.5 | ||
=1.5.0-alpha | ||
=16.04 | ||
=18.04 | ||
=18.10 | ||
Digitalcorpora Tcpflow | <=1.4.5 | |
Digitalcorpora Tcpflow | =1.5.0-alpha | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
debian/tcpflow | 1.5.2+repack1-1 1.6.1-2 1.6.1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.