Out-of-bounds read in tcpflow - CVE-2018-18409
Published: June 25, 2020
tcpflow
Simson L. Garfinkel
Description
The vulnerability allows a remote attacker to gain access to perform a denial of service attack.
The vulnerability exists due to a boundary condition within the setbit() function in iptree.h in tcpflow. A remote attacker can pass specially crafted data to the application, trigger a stack-based buffer over-read and perform a denial of service (DoS) attack.
Remediation
External links
- https://github.com/simsong/tcpflow/issues/195
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K6MP4YMCJX4ITOBFX427UMOA6E7ZLJDE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN5FW6HKPDP7PI2IVNMFSQVIDSCQ5BOR/
- https://usn.ubuntu.com/3955-1/