Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2011-09-02T16:00:00

Updated: 2024-08-06T23:15:31.450Z

Reserved: 2011-07-27T00:00:00

Link: CVE-2011-2903

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2011-09-02T16:55:05.677

Modified: 2017-08-29T01:29:52.067

Link: CVE-2011-2903

cve-icon Redhat

No data.