Vulnerability CVE-2018-17582


Published: 2018-09-28

Description:
Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.

Type:

CWE-125

(Out-of-bounds Read)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
4.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
Partial
Affected software
Tcpreplay project -> Tcpreplay 
Appneta -> Tcpreplay 

 References:
https://github.com/appneta/tcpreplay/issues/484
https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay

Copyright 2024, cxsecurity.com

 

Back to Top