CVE-2018-18409
https://notcve.org/view.php?id=CVE-2018-18409
A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leading to denial of service during an address_histogram call or a get_histogram call. Existe una sobrelectura de búfer basada en pila en setbit() en iptree.h en TCPFLOW 1.5.0, debido a los valores incorrectos recibidos que provocan un cálculo incorrecto, lo que conduce a una denegación de servicio (DoS) durante una llamada address_histogram o get_histogram. • https://github.com/simsong/tcpflow/issues/195 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K6MP4YMCJX4ITOBFX427UMOA6E7ZLJDE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN5FW6HKPDP7PI2IVNMFSQVIDSCQ5BOR https://usn.ubuntu.com/3955-1 • CWE-125: Out-of-bounds Read •
CVE-2018-14938
https://notcve.org/view.php?id=CVE-2018-14938
An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during caplen processing. If the caplen is less than 144, one can cause an integer overflow in the function handle_80211, which will result in an out-of-bounds read and may allow access to sensitive memory (or a denial of service). Se ha descubierto un problema en wifipcap/wifipcap.cpp en TCPFLOW hasta la versión 1.5.0-alpha. Hay un desbordamiento de enteros en la función handle_prism durante el procesamiento de caplen. • https://github.com/simsong/tcpflow/commit/a4e1cd14eb5ccc51ed271b65b3420f7d692c40eb https://github.com/simsong/tcpflow/issues/182 https://lists.debian.org/debian-lts-announce/2020/11/msg00046.html https://usn.ubuntu.com/3955-1 • CWE-125: Out-of-bounds Read CWE-190: Integer Overflow or Wraparound •