nfdump 1.6.17 and earlier is affected by an integer overflow in the function Process_ipfix_template_withdraw in ipfix.c that can be abused in order to crash the process remotely (denial of service).
References
Link | Resource |
---|---|
https://github.com/phaag/nfdump/commit/3b006ededaf351f1723aea6c727c9edd1b1fff9b | Patch |
https://github.com/phaag/nfdump/issues/171 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULSZMKA7P7REJMANVL7D6WMZ2L7IRSET/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTONOGJU5FSMFNRCT6OHXYUMDRKH4RPA/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202003-17 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/09/msg00021.html | Mailing List Third Party Advisory |
Information
Published : 2019-07-31 14:15
Updated : 2023-03-03 10:35
NVD link : CVE-2019-14459
Mitre link : CVE-2019-14459
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
debian
- debian_linux
nfdump_project
- nfdump
fedoraproject
- fedora