Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2011-09-02T16:00:00

Updated: 2017-08-28T12:57:01

Reserved: 2011-07-27T00:00:00


Link: CVE-2011-2903

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2011-09-02T16:55:05.677

Modified: 2017-08-29T01:29:52.067


Link: CVE-2011-2903

JSON object: View

cve-icon Redhat Information

No data.

CWE