CVE-2018-17582

Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.1 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 44%
VendorProductVersion
broadcomtcpreplay
4.3.0:beta1
broadcomtcpreplay
4.3.0:beta2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tcpreplay
bullseye
4.3.3-2
fixed
stretch
no-dsa
jessie
no-dsa
bookworm
4.4.3-1
fixed
sid
4.5.1-1
fixed
trixie
4.5.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tcpreplay
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
ignored
focal
not-affected
eoan
ignored
disco
not-affected
cosmic
ignored
bionic
Fixed 4.2.6-1ubuntu0.1~esm1
released
xenial
Fixed 3.4.4-2+deb8u1ubuntu0.1~esm1
released
trusty
dne