Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tcpflow | Jeremy_elson | 0.10 (including) | 0.10 (including) |
Tcpflow | Jeremy_elson | 0.11 (including) | 0.11 (including) |
Tcpflow | Jeremy_elson | 0.12 (including) | 0.12 (including) |
Tcpflow | Jeremy_elson | 0.20 (including) | 0.20 (including) |