Search CVE reports


Toggle filters

1 – 3 of 3 results


CVE-2026-25061

Medium priority
Needs evaluation

tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.11 management frame elements and performs a length check on the wrong field when handling the TIM element. A crafted frame with a...

1 affected package

tcpflow

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tcpflow Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2018-18409

Medium priority
Fixed

A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leading to denial of service during an address_histogram call or a get_histogram call.

1 affected package

tcpflow

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tcpflow Not affected Not affected Fixed
Show less packages

CVE-2018-14938

Medium priority
Fixed

An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during caplen processing. If the caplen is less than 144, one can cause an integer overflow...

1 affected package

tcpflow

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tcpflow Not affected Not affected Fixed
Show less packages