Vulnerability CVE-2024-52949: Information
Description
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
|---|---|---|---|---|---|---|
| iptraf-ng | sisyphus | 1.2.2-alt1 | 1.2.2-alt1 | ALT-PU-2024-16101-2 | 363324 | Fixed |
| iptraf-ng | sisyphus_loongarch64 | 1.2.2-alt1 | 1.2.2-alt1 | ALT-PU-2024-16148-1 | - | Fixed |
| iptraf-ng | c10f2 | 1.2.2-alt1 | 1.2.2-alt1 | ALT-PU-2025-9601-3 | 390629 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
|---|---|
| https://github.com/iptraf-ng/iptraf-ng/releases/tag/v1.2.1 |
|
| https://www.gruppotim.it/it/footer/red-team.html |
|
| BDU:2025-00501 |