CVE-2018-17582Out-of-bounds Read in Tcpreplay

CWE-125Out-of-bounds Read10 documents7 sources
Severity
7.1HIGHNVD
EPSS
0.2%
top 56.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 28
Latest updateOct 4

Description

Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages2 packages

Debianbroadcom/tcpreplay< 4.3.1-1+3

Patches

🔴Vulnerability Details

4
OSV
tcpreplay vulnerabilities2022-10-04
GHSA
GHSA-92gh-w7h2-5542: Tcpreplay v42022-05-13
OSV
CVE-2018-17582: Tcpreplay v42018-09-28
CVEList
CVE-2018-17582: Tcpreplay v42018-09-28

📋Vendor Advisories

2
Ubuntu
Tcpreplay vulnerabilities2022-10-04
Debian
CVE-2018-17582: tcpreplay - Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_pack...2018

💬Community

3
Bugzilla
CVE-2018-17582 tcpreplay: heap-based buffer over-read in the get_next_packet() in send_packets.c [epel-all]2018-10-01
Bugzilla
CVE-2018-17582 tcpreplay: heap-based buffer over-read in the get_next_packet() in send_packets.c [fedora-all]2018-10-01
Bugzilla
CVE-2018-17582 tcpreplay: heap-based buffer over-read in the get_next_packet() in send_packets.c2018-10-01
CVE-2018-17582 — Out-of-bounds Read in Tcpreplay | cvebase