Description

iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.

INFO

Published Date :

2024-12-16T00:00:00.000Z

Last Modified :

2025-04-03T15:17:11.356Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2024-52949 vulnerability.

Vendors Products
Iptraf-ng
  • Iptraf-ng
Redhat
  • Enterprise Linux

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact