5.5
CVSSv3

CVE-2018-18409

Published: 17/10/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

It exists that tcpflow incorrectly handled certain malformed network packets. A remote attacker could send these packets to a target system, causing tcpflow to crash or possibly disclose sensitive information.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

digitalcorpora tcpflow 1.5.0

fedoraproject fedora 28

fedoraproject fedora 29

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

Vendor Advisories

Debian Bug report logs - #911263 tcpflow: CVE-2018-18409 Package: src:tcpflow; Maintainer for src:tcpflow is Dima Kogan <dkogan@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 17 Oct 2018 19:09:02 UTC Severity: important Tags: fixed-upstream, security, upstream Found in versions tcpflow ...
tcpflow could be made to crash or expose sensitive information over the network if it opened a specially crafted file or received specially crafted network traffic ...