Vulnerability CVE-2024-52949: Information

Description

iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.

Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published: Dec. 16, 2024
Modified: Oct. 14, 2025
Error type identifier: CWE-120

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
iptraf-ngsisyphus1.2.2-alt11.2.2-alt1ALT-PU-2024-16101-2363324Fixed
iptraf-ngsisyphus_loongarch641.2.2-alt11.2.2-alt1ALT-PU-2024-16148-1-Fixed
iptraf-ngc10f21.2.2-alt11.2.2-alt1ALT-PU-2025-9601-3390629Fixed

References to Advisories, Solutions, and Tools

    1. cpe:2.3:a:iptraf-ng:iptraf-ng:1.2.1:*:*:*:*:*:*:*