9.1
CVSSv3

CVE-2018-14938

Published: 05/08/2018 Updated: 29/11/2020
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

An issue exists in wifipcap/wifipcap.cpp in TCPFLOW up to and including 1.5.0-alpha. There is an integer overflow in the function handle_prism during caplen processing. If the caplen is less than 144, one can cause an integer overflow in the function handle_80211, which will result in an out-of-bounds read and may allow access to sensitive memory (or a denial of service).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

digitalcorpora tcpflow

digitalcorpora tcpflow 1.5.0

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

canonical ubuntu linux 16.04

Vendor Advisories

Debian Bug report logs - #905483 tcpflow: CVE-2018-14938: integer overflow vulnerability in wifipacpcpp Package: src:tcpflow; Maintainer for src:tcpflow is Dima Kogan <dkogan@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 5 Aug 2018 09:30:01 UTC Severity: important Tags: fixed-upstrea ...
tcpflow could be made to crash or expose sensitive information over the network if it opened a specially crafted file or received specially crafted network traffic ...