CVE-2011-2903
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
02/09/2011
Last modified:
11/04/2025
Description
Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:rhythm:tcptrack:*:*:*:*:*:*:*:* | 1.4.1 (including) | |
| cpe:2.3:a:rhythm:tcptrack:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.1:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rhythm:tcptrack:1.4.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/oss-sec/2011/q3/293
- http://www.openwall.com/lists/oss-security/2011/08/31/1
- http://www.rhythm.cx/~steve/devel/tcptrack/
- http://www.securityfocus.com/bid/49352
- https://bugs.gentoo.org/show_bug.cgi?id=377917
- https://bugzilla.redhat.com/show_bug.cgi?id=729096
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69467
- http://seclists.org/oss-sec/2011/q3/293
- http://www.openwall.com/lists/oss-security/2011/08/31/1
- http://www.rhythm.cx/~steve/devel/tcptrack/
- http://www.securityfocus.com/bid/49352
- https://bugs.gentoo.org/show_bug.cgi?id=377917
- https://bugzilla.redhat.com/show_bug.cgi?id=729096
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69467



