Description
Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
References (2)
Core 2
Core References
Exploit, Patch, Third Party Advisory x_refsource_misc
https://github.com/appneta/tcpreplay/issues/484
Exploit, Third Party Advisory x_refsource_misc
https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay
Scores
CVSS v3
7.1
EPSS
0.0021
EPSS Percentile
43.0%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (1)
broadcom/tcpreplay
4.3.0 beta1 (2 CPE variants)
Published
Sep 28, 2018
Tracked Since
Feb 18, 2026