Broadcom Tcpreplay 4.3.0 Beta 2

CPE Details

Broadcom Tcpreplay 4.3.0 Beta 2
4.3.0
2022-03-30
13h22 +00:00
2022-04-02
01h29 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:broadcom:tcpreplay:4.3.0:beta2:*:*:*:*:*:*

Informations

Vendor

broadcom

Product

tcpreplay

Version

4.3.0

Update

beta2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-3024 2024-03-28 02h00 +00:00 A vulnerability was found in appneta tcpreplay up to 4.4.4. It has been classified as problematic. This affects the function get_layer4_v6 of the file /tcpreplay/src/common/get.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-258333 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
7.8
High
CVE-2020-12740 2020-05-08 15h03 +00:00 tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
9.1
Critical
CVE-2018-20552 2018-12-28 13h00 +00:00 Tcpreplay before 4.3.1 has a heap-based buffer over-read in packet2tree in tree.c.
7.8
High
CVE-2018-20553 2018-12-28 13h00 +00:00 Tcpreplay before 4.3.1 has a heap-based buffer over-read in get_l2len in common/get.c.
7.8
High
CVE-2018-17582 2018-09-28 07h00 +00:00 Tcpreplay v4.3.0 beta1 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file.
7.1
High