Broadcom Tcpreplay 4.3.2

CPE Details

Broadcom Tcpreplay 4.3.2
4.3.2
2022-03-30
13h22 +00:00
2022-04-02
01h29 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:broadcom:tcpreplay:4.3.2:*:*:*:*:*:*:*

Informations

Vendor

broadcom

Product

tcpreplay

Version

4.3.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-3024 2024-03-28 02h00 +00:00 A vulnerability was found in appneta tcpreplay up to 4.4.4. It has been classified as problematic. This affects the function get_layer4_v6 of the file /tcpreplay/src/common/get.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-258333 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
7.8
High
CVE-2020-23273 2021-09-21 21h04 +00:00 Heap-buffer overflow in the randomize_iparp function in edit_packet.c. of Tcpreplay v4.3.2 allows attackers to cause a denial of service (DOS) via a crafted pcap.
5.5
Medium
CVE-2020-18976 2021-08-25 13h54 +00:00 Buffer Overflow in Tcpreplay v4.3.2 allows attackers to cause a Denial of Service via the 'do_checksum' function in 'checksum.c'. It can be triggered by sending a crafted pcap file to the 'tcpreplay-edit' binary. This issue is different than CVE-2019-8381.
5.5
Medium
CVE-2020-12740 2020-05-08 15h03 +00:00 tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
9.1
Critical