CVE-2018-14938Out-of-bounds Read in Tcpflow

Severity
9.1CRITICALNVD
EPSS
0.5%
top 35.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 5
Latest updateMay 13

Description

An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during caplen processing. If the caplen is less than 144, one can cause an integer overflow in the function handle_80211, which will result in an out-of-bounds read and may allow access to sensitive memory (or a denial of service).

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages2 packages

Debiandigitalcorpora/tcpflow< 1.5.0+repack1-1+3

Also affects: Ubuntu Linux 16.04, 18.04, 18.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-prgj-cjmj-v8ff: An issue was discovered in wifipcap/wifipcap2022-05-13
CVEList
CVE-2018-14938: An issue was discovered in wifipcap/wifipcap2018-08-05
OSV
CVE-2018-14938: An issue was discovered in wifipcap/wifipcap2018-08-05

📋Vendor Advisories

2
Ubuntu
tcpflow vulnerabilities2019-04-24
Debian
CVE-2018-14938: tcpflow - An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha....2018

💬Community

3
Bugzilla
CVE-2018-14938 tcpflow: integer overflow vulnerability in wifipacp.cpp [fedora-all]2018-08-08
Bugzilla
CVE-2018-14938 tcpflow: integer overflow vulnerability in wifipacp.cpp [epel-7]2018-08-08
Bugzilla
CVE-2018-14938 tcpflow: integer overflow vulnerability in wifipacp.cpp2018-08-08
CVE-2018-14938 — Out-of-bounds Read in Tcpflow | cvebase