Vulnerability Description
Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Broadcom | Tcpreplay | 4.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/SegfaultMasters/covering360/blob/master/tcpreplayExploitThird Party Advisory
- https://github.com/appneta/tcpreplay/issues/484ExploitPatchThird Party Advisory
- https://github.com/SegfaultMasters/covering360/blob/master/tcpreplayExploitThird Party Advisory
- https://github.com/appneta/tcpreplay/issues/484ExploitPatchThird Party Advisory
FAQ
What is CVE-2018-17582?
CVE-2018-17582 is a vulnerability with a CVSS score of 7.1 (HIGH). Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pk...
How severe is CVE-2018-17582?
CVE-2018-17582 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-17582?
Check the references section above for vendor advisories and patch information. Affected products include: Broadcom Tcpreplay.