CVE-2018-20553
Published: 28 December 2018
Tcpreplay before 4.3.1 has a heap-based buffer over-read in get_l2len in common/get.c.
Notes
| Author | Note |
|---|---|
| ccdm94 | version 4.3.2 includes the fix applied by the original patch, however, additional fixes have been released since, and 4.3.2 does not include those. |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
tcpreplay Launchpad, Ubuntu, Debian |
bionic |
Released
(4.2.6-1ubuntu0.1~esm2)
Available with Ubuntu Pro |
| cosmic |
Ignored
(end of life)
|
|
| disco |
Not vulnerable
(4.3.1-2)
|
|
| eoan |
Ignored
(end of life)
|
|
| focal |
Released
(4.3.2-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
| groovy |
Ignored
(end of life)
|
|
| hirsute |
Not vulnerable
(4.3.3-2)
|
|
| impish |
Not vulnerable
(4.3.3-2)
|
|
| jammy |
Not vulnerable
|
|
| kinetic |
Not vulnerable
|
|
| lunar |
Not vulnerable
|
|
| mantic |
Not vulnerable
|
|
| noble |
Not vulnerable
|
|
| trusty |
Does not exist
(trusty was needed)
|
|
| upstream |
Released
(4.3.3)
|
|
| xenial |
Released
(3.4.4-2+deb8u1ubuntu0.1~esm2)
Available with Ubuntu Pro |
|
|
Patches: upstream: https://github.com/appneta/tcpreplay/pull/584/commits/4f51c34c353759701057178f45dc7ba37e014994 upstream: https://github.com/appneta/tcpreplay/pull/532/commits/6b830a1640ca20528032c89a4fdd8291a4d2d8b2 |
||
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.8 |
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |