iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
{ "ubuntu_priority": "low", "priority_reason": "Limited to a denial of service only because of compiler hardening" }