Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-17582

Опубликовано: 28 сент. 2018
Источник: nvd
CVSS3: 7.1
CVSS2: 5.8
EPSS Низкий

Описание

Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:broadcom:tcpreplay:4.3.0:beta1:*:*:*:*:*:*
cpe:2.3:a:broadcom:tcpreplay:4.3.0:beta2:*:*:*:*:*:*

EPSS

Процентиль: 43%
0.00208
Низкий

7.1 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 7 лет назад

Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.

CVSS3: 7.1
debian
больше 7 лет назад

Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get ...

CVSS3: 7.1
github
больше 3 лет назад

Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.

EPSS

Процентиль: 43%
0.00208
Низкий

7.1 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-125