CVE-2018-14938

Priority
Description
An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through
1.5.0-alpha. There is an integer overflow in the function handle_prism
during caplen processing. If the caplen is less than 144, one can cause an
integer overflow in the function handle_80211, which will result in an
out-of-bounds read and may allow access to sensitive memory (or a denial of
service).
Ubuntu-Description
It was discovered that tcpflow mishandled certain crafted input, resulting in
an integer overflow. An attacker could use this vulnerability to leak
sensitive information or cause a denial of service (crash).
Notes
Package
Upstream:released (1.5.0+repack1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (1.4.5+repack1-1ubuntu0.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.4.5+repack1-4ubuntu0.18.04.1)
Ubuntu 19.04 (Disco Dingo):not-affected (1.5.2+repack1-1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1.5.2+repack1-1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.5.2+repack1-1)
More Information

Updated: 2019-12-05 19:53:58 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)