Executive Summary

Summary
Title TCPTrack: Arbitrary code execution
Informations
Name GLSA-201402-22 First vendor Publication 2014-02-21
Vendor Gentoo Last vendor Modification 2014-02-21
Severity (Vendor) Normal Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A heap-based buffer overflow in TCPTrack might allow a remote attacker to execute arbitrary code.

Background

TCPTrack is a simple libpcap based program for live TCP connection monitoring.

Description

A heap-based buffer overflow vulnerability exists in TCPTrack's parsing of command line arguments. This is only a vulnerability in limited scenarios in which TCPTrack is "configured as a handler for other applications."

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition with a specially crafted command-line argument.

Workaround

There is no known workaround at this time.

Resolution

All TCPTrack users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/tcptrack-1.4.2"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since August 06, 2011. It is likely that your system is already no longer affected by this issue.

References

[ 1 ] CVE-2011-2903 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2903

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201402-22.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-201402-22.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 14

OpenVAS Exploits

Date Description
2011-09-13 Name : Tcptrack Command Line Parsing Heap Based Buffer Overflow Vulnerability
File : nvt/gb_tcptrack_long_command_bof_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
75208 tcptrack Command Line Argument Overflow

Nessus® Vulnerability Scanner

Date Description
2014-02-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201402-22.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-23 13:21:09
  • Multiple Updates
2014-02-21 17:18:40
  • First insertion