Home page logo
/

oss-sec logo oss-sec mailing list archives

Re: CVE request: heap overflow in tcptrack < 1.4.2
From: "Steven M. Christey" <coley () rcf-smtp mitre org>
Date: Wed, 31 Aug 2011 18:35:45 -0400 (EDT)


I'm wondering if this should have received a CVE.

https://bugs.gentoo.org/show_bug.cgi?id=377917 quotes upstream:

   "This fixes a heap overflow in the parsing of the command line...
    this may have security repercussions if
    tcptrack is configured as a handler for other applications that can
    pass user-supplied command line input to tcptrack."

The "attack" is through a command line argument. While it's listed as a sniffer, the above text suggests that tcptrack might not be setuid/privileged, since the only given scenario is "as a handler for other applications." Unless this is a typical/known scenario, this seems like just another unprivileged application, in which case the control over a command line argument would not directly cross privilege boundaries, thus falling into the realm of "bug" and not "vulnerability."

- Steve


On Tue, 9 Aug 2011, Josh Bressers wrote:



----- Original Message -----
A heap overflow in the parsing of tcptrack's command line was found.
The details are pretty sparse, but here are some references:

http://www.rhythm.cx/~steve/devel/tcptrack/#news
https://bugs.gentoo.org/show_bug.cgi?id=377917
https://bugzilla.redhat.com/show_bug.cgi?id=729096


Please use CVE-2011-2903.

Thanks.

--
   JB



  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]