CVE-2019-8377

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-8377
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-8377.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-8377
Related
Published
2019-02-17T02:29:00Z
Modified
2024-10-12T05:23:41.239128Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function getipv6l4proto() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.

References

Affected packages

Debian:11 / tcpreplay

Package

Name
tcpreplay
Purl
pkg:deb/debian/tcpreplay?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.1-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / tcpreplay

Package

Name
tcpreplay
Purl
pkg:deb/debian/tcpreplay?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.1-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / tcpreplay

Package

Name
tcpreplay
Purl
pkg:deb/debian/tcpreplay?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.1-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Git / github.com/appneta/tcpreplay

Affected ranges

Type
GIT
Repo
https://github.com/appneta/tcpreplay
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

help

v3.*

v3.4.2
v3.4.3
v3.4.4

v4.*

v4.0.0
v4.0.0beta1
v4.0.0beta2
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.0.5
v4.0.5beta1
v4.0.5beta2
v4.0.5beta3
v4.1.0
v4.1.0beta1
v4.1.0beta2
v4.1.1
v4.1.1-beta2
v4.1.1-beta3
v4.1.2
v4.2.0
v4.2.0-beta1
v4.2.1
v4.2.2
v4.2.2-beta1
v4.2.3
v4.2.4
v4.2.5
v4.2.5-beta1
v4.2.6
v4.3.0
v4.3.0-beta1
v4.3.0-beta2
v4.3.1