CVE-2018-17582

HIGH

Tcpreplay v4.3.0 beta1 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.

References (2)

Core 2
Core References
Exploit, Patch, Third Party Advisory x_refsource_misc
https://github.com/appneta/tcpreplay/issues/484
Exploit, Third Party Advisory x_refsource_misc
https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay

Scores

CVSS v3 7.1
EPSS 0.0021
EPSS Percentile 43.0%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

Details

CWE
CWE-125
Status published
Products (1)
broadcom/tcpreplay 4.3.0 beta1 (2 CPE variants)
Published Sep 28, 2018
Tracked Since Feb 18, 2026