Description
A use-after-free was discovered in the tcpbridge binary of Tcpreplay 4.3.0 beta1. The issue gets triggered in the function post_args() at tcpbridge.c, causing a denial of service or possibly unspecified other impact.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Affected Packages2 packages
Also affects: Fedora 28, 29
🔴Vulnerability Details
3GHSAGHSA-rc6v-3qc7-jpvm: A use-after-free was discovered in the tcpbridge binary of Tcpreplay 4↗2022-05-13 ▶ CVEListCVE-2018-18408: A use-after-free was discovered in the tcpbridge binary of Tcpreplay 4↗2018-10-17 ▶ OSVCVE-2018-18408: A use-after-free was discovered in the tcpbridge binary of Tcpreplay 4↗2018-10-17 ▶ 📋Vendor Advisories
2UbuntuTcpreplay vulnerabilities↗2022-10-04 ▶ DebianCVE-2018-18408: tcpreplay - A use-after-free was discovered in the tcpbridge binary of Tcpreplay 4.3.0 beta1...↗2018 ▶ 💬Community
3BugzillaCVE-2018-18408 tcpreplay: use-after-free in post_args function in tcpbridge.c↗2018-11-05 ▶ BugzillaCVE-2018-18408 tcpreplay: use-after-free in post_args function in tcpbridge.c [fedora-all]↗2018-11-05 ▶ BugzillaCVE-2018-18408 tcpreplay: use-after-free in post_args function in tcpbridge.c [epel-all]↗2018-11-05 ▶