Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is "configured as a handler for other applications." This issue might not qualify for inclusion in CVE.
Max CVSS
6.8
EPSS Score
1.42%
Published
2011-09-02
Updated
2017-08-29
1 vulnerabilities found