{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T01:46:34.142","vulnerabilities":[{"cve":{"id":"CVE-2011-2903","sourceIdentifier":"secalert@redhat.com","published":"2011-09-02T16:55:05.677","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Heap-based buffer overflow in tcptrack before 1.4.2 might allow attackers to execute arbitrary code via a long command line argument. NOTE: this is only a vulnerability in limited scenarios in which tcptrack is \"configured as a handler for other applications.\" This issue might not qualify for inclusion in CVE."},{"lang":"es","value":"Desbordamiento de bufer basado en memoria dinámica en tcptrack antes de v1.4.2 podría permitir a atacantes ejecutar codigo de su elección a través de un argumento de linea de comando largo. NOTA: esta es solamente un vulnerabilidad en escenarios limitados en los que tcptrack está \"configurado como manejador para otras aplicaciones\". Este fallo puede on estar cualificado para inclusión en CVE."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:*:*:*:*:*:*:*:*","versionEndIncluding":"1.4.1","matchCriteriaId":"FE8F756F-F479-47F9-B9CD-32C84DECB62D"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.0.0:*:*:*:*:*:*:*","matchCriteriaId":"0505E0D4-EE25-40CC-8498-B750F6EA1706"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"C4ACCB71-8703-42B8-B2A4-254638342B78"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"868D560B-411D-4D92-8972-2820DFE26017"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.1:*:*:*:*:*:*:*","matchCriteriaId":"34162318-DCDC-49CA-932C-39EF6BFA8797"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.1:beta1:*:*:*:*:*:*","matchCriteriaId":"6A122080-F32A-4913-B59B-2137C62A5DD3"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"FD68EA3E-BB47-4CF2-BC1D-2E87066DAFBD"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"1C0C1E91-CE04-4CBF-9BA6-B6F844B2D881"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"85BE6467-BDD4-41B0-8BE3-3EF8DC482B10"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.1.3:*:*:*:*:*:*:*","matchCriteriaId":"341F8D6F-7A5B-4906-9F93-D9096CBEBDAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"B3E3C0AF-2CF2-4E86-AAAE-817D5F9FBAE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.1.5:*:*:*:*:*:*:*","matchCriteriaId":"E40367CA-1996-494F-935B-2956B97B2036"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"9EC7E8B2-835F-481B-AD71-FB7F1D94F80E"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"D247729A-CC40-488C-963A-B7C545C1AFAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhythm:tcptrack:1.4.0:*:*:*:*:*:*:*","matchCriteriaId":"86D43D1A-EAA2-4B84-9A0A-5151C07D5B4C"}]}]}],"references":[{"url":"http://seclists.org/oss-sec/2011/q3/293","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2011/08/31/1","source":"secalert@redhat.com"},{"url":"http://www.rhythm.cx/~steve/devel/tcptrack/","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/49352","source":"secalert@redhat.com"},{"url":"https://bugs.gentoo.org/show_bug.cgi?id=377917","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=729096","source":"secalert@redhat.com","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/69467","source":"secalert@redhat.com"},{"url":"http://seclists.org/oss-sec/2011/q3/293","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2011/08/31/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.rhythm.cx/~steve/devel/tcptrack/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/49352","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugs.gentoo.org/show_bug.cgi?id=377917","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=729096","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/69467","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}