[Bug 1110285] New: VUL-1: CVE-2018-17582: tcpreplay: The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata
http://bugzilla.opensuse.org/show_bug.cgi?id=1110285 Bug ID: 1110285 Summary: VUL-1: CVE-2018-17582: tcpreplay: The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.3 Hardware: Other URL: https://smash.suse.de/issue/215887/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Security Assignee: mkubecek@suse.com Reporter: kbabioch@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2018-17582 tcpreplay v4.3.0 contains a heap-based buffer over-read. The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata to the destination (*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process a file. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-17582 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-17582.html https://github.com/appneta/tcpreplay/issues/484 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1110285 http://bugzilla.opensuse.org/show_bug.cgi?id=1110285#c1 Karol Babioch <kbabioch@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |INVALID --- Comment #1 from Karol Babioch <kbabioch@suse.com> --- Since 4.3.0 is not yet released, this is not a problem for us. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com