Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
2018-09-28T09:29:01.057
2024-11-21T03:54:38.863
Modified
CVSSv3.0: 7.1 (HIGH)
AV:N/AC:M/Au:N/C:P/I:N/A:P
8.6
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | broadcom | tcpreplay | 4.3.0 | Yes |
Application | broadcom | tcpreplay | 4.3.0 | Yes |