Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The getnextpacket() function in the sendpackets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prevpacket)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.4.4-2+deb8u1ubuntu0.1~esm1", "binary_name": "tcpreplay" }, { "binary_version": "3.4.4-2+deb8u1ubuntu0.1~esm1", "binary_name": "tcpreplay-dbgsym" } ] }