Описание
Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| cosmic | ignored | end of life |
| devel | not-affected | |
| disco | not-affected | 4.3.1-2 |
| eoan | ignored | end of life |
| esm-apps/bionic | released | 4.2.6-1ubuntu0.1~esm1 |
| esm-apps/focal | not-affected | 4.3.2-1build1 |
| esm-apps/jammy | not-affected | |
| esm-apps/xenial | released | 3.4.4-2+deb8u1ubuntu0.1~esm1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
Показывать по
5.8 Medium
CVSS2
7.1 High
CVSS3
Связанные уязвимости
Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get ...
Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
5.8 Medium
CVSS2
7.1 High
CVSS3