CVE-2018-18409

NameCVE-2018-18409
DescriptionA stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leading to denial of service during an address_histogram call or a get_histogram call.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs911263

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tcpflow (PTS)jessie1.4.4+repack1-3vulnerable
stretch1.4.5+repack1-3vulnerable
buster, sid1.5.2+repack1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tcpflowsource(unstable)1.5.2+repack1-1unimportant911263

Notes

https://github.com/simsong/tcpflow/issues/195
https://github.com/simsong/tcpflow/commit/89c04b4fb0e46b3c4f1388686e83966e531cbea9
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems