CVE-2018-17974

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-17974
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-17974.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-17974
Related
Published
2018-10-03T22:29:00Z
Modified
2024-10-12T03:17:45.080833Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Tcpreplay 4.3.0 beta1. A heap-based buffer over-read was triggered in the function dlten10mbencode() of the file plugins/dlt_en10mb/en10mb.c, due to inappropriate values in the function memmove(). The length (pktlen + ctx -> l2len) can be larger than source value (packet + ctx->l2len) because the function fails to ensure the length of a packet is valid. This leads to Denial of Service.

References

Affected packages

Debian:11 / tcpreplay

Package

Name
tcpreplay
Purl
pkg:deb/debian/tcpreplay?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / tcpreplay

Package

Name
tcpreplay
Purl
pkg:deb/debian/tcpreplay?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / tcpreplay

Package

Name
tcpreplay
Purl
pkg:deb/debian/tcpreplay?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/appneta/tcpreplay

Affected ranges

Type
GIT
Repo
https://github.com/appneta/tcpreplay
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

help

v3.*

v3.4.2
v3.4.3
v3.4.4

v4.*

v4.0.0
v4.0.0beta1
v4.0.0beta2
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.0.5
v4.0.5beta1
v4.0.5beta2
v4.0.5beta3
v4.1.0
v4.1.0beta1
v4.1.0beta2
v4.1.1
v4.1.1-beta2
v4.1.1-beta3
v4.1.2
v4.2.0
v4.2.0-beta1
v4.2.1
v4.2.2
v4.2.2-beta1
v4.2.3
v4.2.4
v4.2.5
v4.2.5-beta1
v4.2.6
v4.3.0-beta1