CVE-2018-14938

Name
CVE-2018-14938
Description
An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during caplen processing. If the caplen is less than 144, one can cause an integer overflow in the function handle_80211, which will result in an out-of-bounds read and may allow access to sensitive memory (or a denial of service).
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://github.com/simsong/tcpflow/issues/182
Patch https://github.com/simsong/tcpflow/commit/a4e1cd14eb5ccc51ed271b65b3420f7d692c40eb
Third Party Advisory https://usn.ubuntu.com/3955-1/
MLIST https://lists.debian.org/debian-lts-announce/2020/11/msg00046.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:digitalcorpora:tcpflow:*:*:*:*:*:*:*:* tcpflow >= None <= 1.4.5
cpe:2.3:a:digitalcorpora:tcpflow:1.5.0:alpha:*:*:*:*:*:* tcpflow == None == 1.5.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
tcpflow edge-main 1.5.0-r1 None fixed
tcpflow edge-main 1.5.0-r0 None fixed
tcpflow 3.22-main 1.5.0-r1 None fixed
tcpflow 3.22-main 1.5.0-r0 None fixed
tcpflow 3.21-main 1.5.0-r1 None fixed
tcpflow 3.21-main 1.5.0-r0 None fixed
tcpflow 3.20-main 1.5.0-r1 None fixed
tcpflow 3.20-main 1.5.0-r0 None fixed
tcpflow 3.19-main 1.5.0-r1 None fixed
tcpflow 3.19-main 1.5.0-r0 None fixed
tcpflow 3.18-main 1.5.0-r0 None fixed
tcpflow 3.17-main 1.5.0-r0 None fixed
tcpflow 3.12-main 1.5.0-r3 Natanael Copa <ncopa@alpinelinux.org> fixed
tcpflow 3.12-main 1.5.0-r0 None fixed
tcpflow 3.11-main 1.5.0-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
tcpflow 3.11-main 1.5.0-r0 None fixed