CVE-2018-18409

Priority
Description
A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW
1.5.0, due to received incorrect values causing incorrect computation,
leading to denial of service during an address_histogram call or a
get_histogram call.
Ubuntu-Description
It was discovered that tcpflow mishandled certain crafted input. An attacker
could use this vulnerability to cause a denial of service (crash) or possibly
execute arbitrary code.
Notes
Package
Upstream:released (1.5.2+repack1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (1.4.5+repack1-1ubuntu0.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.4.5+repack1-4ubuntu0.18.04.1)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (1.5.2+repack1-1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (1.5.2+repack1-1)
More Information

Updated: 2020-07-28 18:50:25 UTC (commit 7b6828437fde0509248708fcdb5b0f7587b85bd1)