UBUNTU-CVE-2018-14938

Source
https://ubuntu.com/security/CVE-2018-14938
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14938.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2018-14938
Related
Published
2018-08-04T00:00:00Z
Modified
2025-01-13T10:21:40Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handleprism during caplen processing. If the caplen is less than 144, one can cause an integer overflow in the function handle80211, which will result in an out-of-bounds read and may allow access to sensitive memory (or a denial of service).

References

Affected packages

Ubuntu:Pro:14.04:LTS / tcpflow

Package

Name
tcpflow
Purl
pkg:deb/ubuntu/tcpflow@1.4.4+repack1-2ubuntu0.1~esm1?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.4+repack1-2ubuntu0.1~esm1

Affected versions

1.*

1.3.0+dfsg-2
1.4.3+repack1-1
1.4.4+repack1-1
1.4.4+repack1-2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.4.4+repack1-2ubuntu0.1~esm1",
            "binary_name": "tcpflow"
        },
        {
            "binary_version": "1.4.4+repack1-2ubuntu0.1~esm1",
            "binary_name": "tcpflow-dbg"
        },
        {
            "binary_version": "1.4.4+repack1-2ubuntu0.1~esm1",
            "binary_name": "tcpflow-dbgsym"
        }
    ]
}

Ubuntu:16.04:LTS / tcpflow

Package

Name
tcpflow
Purl
pkg:deb/ubuntu/tcpflow@1.4.5+repack1-1ubuntu0.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.5+repack1-1ubuntu0.1

Affected versions

1.*

1.4.4+repack1-3
1.4.5+repack1-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.4.5+repack1-1ubuntu0.1",
            "binary_name": "tcpflow"
        },
        {
            "binary_version": "1.4.5+repack1-1ubuntu0.1",
            "binary_name": "tcpflow-dbg"
        },
        {
            "binary_version": "1.4.5+repack1-1ubuntu0.1",
            "binary_name": "tcpflow-dbgsym"
        },
        {
            "binary_version": "1.4.5+repack1-1ubuntu0.1",
            "binary_name": "tcpflow-nox"
        },
        {
            "binary_version": "1.4.5+repack1-1ubuntu0.1",
            "binary_name": "tcpflow-nox-dbgsym"
        }
    ]
}

Ubuntu:18.04:LTS / tcpflow

Package

Name
tcpflow
Purl
pkg:deb/ubuntu/tcpflow@1.4.5+repack1-4ubuntu0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.5+repack1-4ubuntu0.18.04.1

Affected versions

1.*

1.4.5+repack1-4
1.4.5+repack1-4build1
1.4.5+repack1-4build2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.4.5+repack1-4ubuntu0.18.04.1",
            "binary_name": "tcpflow"
        },
        {
            "binary_version": "1.4.5+repack1-4ubuntu0.18.04.1",
            "binary_name": "tcpflow-dbgsym"
        },
        {
            "binary_version": "1.4.5+repack1-4ubuntu0.18.04.1",
            "binary_name": "tcpflow-nox"
        },
        {
            "binary_version": "1.4.5+repack1-4ubuntu0.18.04.1",
            "binary_name": "tcpflow-nox-dbgsym"
        }
    ]
}