Buffer overflow in the tcpcapinfo utility in Tcpreplay before 4.2.0 Beta 1 allows remote attackers to have unspecified impact via a pcap file with an over-size packet.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6429.json"
[
{
"target": {
"file": "src/tcpcapinfo.c"
},
"id": "CVE-2017-6429-5a7d4809",
"signature_type": "Line",
"signature_version": "v1",
"source": "https://github.com/appneta/tcpreplay/commit/d689d14dbcd768c028eab2fb378d849e543dcfe9",
"digest": {
"line_hashes": [
"281725724443574481629112586016478690515",
"39914050534657491552246455914744946764",
"212123640682198271401289884838733816407",
"185955081791656345592403159214978745600",
"104050355408684653759002709540171880836",
"200175187179004183381615722007415191128",
"261438908669750218030691149261585102021"
],
"threshold": 0.9
},
"deprecated": false
},
{
"target": {
"file": "src/tcpcapinfo.c",
"function": "main"
},
"id": "CVE-2017-6429-84445cdb",
"signature_type": "Function",
"signature_version": "v1",
"source": "https://github.com/appneta/tcpreplay/commit/d689d14dbcd768c028eab2fb378d849e543dcfe9",
"digest": {
"function_hash": "116528098751014854197503951958472637041",
"length": 6331.0
},
"deprecated": false
}
]