[arch-security] [ASA-201706-29] tcpreplay: arbitrary code execution
Arch Linux Security Advisory ASA-201706-29 ========================================== Severity: High Date : 2017-06-23 CVE-ID : CVE-2017-6429 Package : tcpreplay Type : arbitrary code execution Remote : No Link : https://security.archlinux.org/AVG-211 Summary ======= The package tcpreplay before version 4.2.5-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 4.2.5-1. # pacman -Syu "tcpreplay>=4.2.5-1" The problem has been fixed upstream in version 4.2.5. Workaround ========== None. Description =========== Buffer overflow in the tcpcapinfo utility in tcpreplay before 4.2.0 Beta 1 allows attackers to have unspecified impact via a pcap file with an over-size packet. Impact ====== An attacker can provide a crafted pcap file with an over-size packet to execute arbitrary code with the privileges of the tcpcapinfo process. References ========== https://github.com/appneta/tcpreplay/commit/d689d14dbcd768c028eab2fb378d849e... https://github.com/appneta/tcpreplay/issues/278 http://www.securityfocus.com/bid/96579 https://security.archlinux.org/CVE-2017-6429
participants (1)
-
Santiago Torres-Arias