A flaw was found in tcpreplay v4.3.0. A heap-based buffer over-read in the get_next_packet() function in the send_packets.c file due to the use of the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
Created tcpreplay tracking bugs for this issue:
Affects: epel-all [bug 1635043]
Affects: fedora-all [bug 1635042]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.