A flaw was found in tcpreplay v4.3.0. A heap-based buffer over-read in the get_next_packet() function in the send_packets.c file due to the use of the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file. References: https://github.com/appneta/tcpreplay/issues/484 https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay
Created tcpreplay tracking bugs for this issue: Affects: epel-all [bug 1635043] Affects: fedora-all [bug 1635042]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.