SB2018101716 - Denial of service in tcpflow
Published: October 17, 2018 Updated: June 25, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2018-18409)
The vulnerability allows a remote attacker to gain access to perform a denial of service attack.
The vulnerability exists due to a boundary condition within the setbit() function in iptree.h in tcpflow. A remote attacker can pass specially crafted data to the application, trigger a stack-based buffer over-read and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://github.com/simsong/tcpflow/issues/195
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K6MP4YMCJX4ITOBFX427UMOA6E7ZLJDE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN5FW6HKPDP7PI2IVNMFSQVIDSCQ5BOR/
- https://usn.ubuntu.com/3955-1/