Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Tcpflow | Jeremy_elson | 0.10 (including) | 0.10 (including) |
| Tcpflow | Jeremy_elson | 0.11 (including) | 0.11 (including) |
| Tcpflow | Jeremy_elson | 0.12 (including) | 0.12 (including) |
| Tcpflow | Jeremy_elson | 0.20 (including) | 0.20 (including) |