CVE-2011-2903

Severity CVSS v4.0:
Pending analysis
Type:
CWE-119 Buffer Errors
Publication date:
02/09/2011
Last modified:
11/04/2025

Description

Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:rhythm:tcptrack:*:*:*:*:*:*:*:* 1.4.1 (including)
cpe:2.3:a:rhythm:tcptrack:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.1:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.1:beta1:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:rhythm:tcptrack:1.4.0:*:*:*:*:*:*:*